Sciweavers

1640 search results - page 63 / 328
» Deriving Private Information from Randomized Data
Sort
View
AEI
2006
108views more  AEI 2006»
14 years 10 months ago
Grammatical rules for specifying information for automated product data modeling
This paper presents a linguistic framework for developing a formal knowledge acquisition method. The framework is intended to empower domain experts to specify information require...
Ghang Lee, Charles M. Eastman, Rafael Sacks, Shamk...
BMCBI
2008
138views more  BMCBI 2008»
14 years 10 months ago
Information transfer in signaling pathways: A study using coupled simulated and experimental data
Background: The topology of signaling cascades has been studied in quite some detail. However, how information is processed exactly is still relatively unknown. Since quite divers...
Jürgen Pahle, Anne K. Green, C. Jane Dixon, U...
ICALP
2005
Springer
15 years 3 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
TPDS
2010
135views more  TPDS 2010»
14 years 8 months ago
Maximizing Service Reliability in Distributed Computing Systems with Random Node Failures: Theory and Implementation
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Jorge E. Pezoa, Sagar Dhakal, Majeed M. Hayat
ICML
2006
IEEE
15 years 10 months ago
Active sampling for detecting irrelevant features
The general approach for automatically driving data collection using information from previously acquired data is called active learning. Traditional active learning addresses the...
Sriharsha Veeramachaneni, Emanuele Olivetti, Paolo...