Sciweavers

160 search results - page 16 / 32
» Estimating Number of Citations Using Author Reputation
Sort
View
123
Voted
BMCBI
2010
99views more  BMCBI 2010»
15 years 3 months ago
Prediction of novel precursor miRNAs using a context-sensitive hidden Markov model (CSHMM)
Background: It has been apparent in the last few years that small non coding RNAs (ncRNA) play a very significant role in biological regulation. Among these microRNAs (miRNAs), 22...
Sumeet Agarwal, Candida Vaz, Alok Bhattacharya, As...
151
Voted
SODA
2000
ACM
85views Algorithms» more  SODA 2000»
15 years 4 months ago
Improved bounds on the sample complexity of learning
We present a new general upper bound on the number of examples required to estimate all of the expectations of a set of random variables uniformly well. The quality of the estimat...
Yi Li, Philip M. Long, Aravind Srinivasan
160
Voted
XMLSEC
2003
ACM
15 years 8 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
141
Voted
GIS
2007
ACM
15 years 7 months ago
Optimal traversal planning in road networks with navigational constraints
A frequent query in geospatial planning and decision making domains (e.g., emergency response, data acquisition, street cleaning), is to find an optimal traversal plan (OTP) that ...
Leyla Kazemi, Cyrus Shahabi, Mehdi Sharifzadeh, Lu...
CCS
2007
ACM
15 years 9 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment