Sciweavers

1518 search results - page 125 / 304
» Cryptographic Test Correction
Sort
View
AAAI
1997
15 years 5 months ago
Smokey: Automatic Recognition of Hostile Messages
Abusive messages (flames) can be both a source of frustration and a waste of time for Internet users. This paper describes some approaches to flame recognition, including a protot...
Ellen Spertus
WSC
2000
15 years 5 months ago
Experimental performance evaluation of batch means procedures for simulation output analysis
We summarize the results of an extensive experimental performance evaluation of selected batch means procedures for building a confidence interval for a steady-state expected simu...
Natalie M. Steiger, James R. Wilson
AAAI
1994
15 years 5 months ago
Tractable Planning with State Variables by Exploiting Structural Restrictions
So far, tractable planning problems reported in the literature have been defined by syntactical restrictions. To better exploit the inherent structure in problems, however, it is ...
Peter Jonsson, Christer Bäckström
PAMI
2006
128views more  PAMI 2006»
15 years 3 months ago
Multisurface Proximal Support Vector Machine Classification via Generalized Eigenvalues
A new approach to support vector machine (SVM) classification is proposed wherein each of two data sets are proximal to one of two distinct planes that are not parallel to each oth...
Olvi L. Mangasarian, Edward W. Wild
BMCBI
2004
116views more  BMCBI 2004»
15 years 3 months ago
Evaluation of the suitability of free-energy minimization using nearest-neighbor energy parameters for RNA secondary structure p
Background: A detailed understanding of an RNA's correct secondary and tertiary structure is crucial to understanding its function and mechanism in the cell. Free energy mini...
Kishore J. Doshi, Jamie J. Cannone, Christian W. C...