Sciweavers

1781 search results - page 237 / 357
» Functional Answer Set Programming
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 2 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
CSB
2005
IEEE
118views Bioinformatics» more  CSB 2005»
15 years 7 months ago
Gene Teams with Relaxed Proximity Constraint
Functionally related genes co-evolve, probably due to the strong selection pressure in evolution. Thus we expect that they are present in multiple genomes. Physical proximity amon...
Sun Kim, Jeong-Hyeon Choi, Jiong Yang
ICNC
2005
Springer
15 years 7 months ago
Training Data Selection for Support Vector Machines
Abstract. In recent years, support vector machines (SVMs) have become a popular tool for pattern recognition and machine learning. Training a SVM involves solving a constrained qua...
Jigang Wang, Predrag Neskovic, Leon N. Cooper
MICCAI
1999
Springer
15 years 5 months ago
A New Approach to 3D Sulcal Ribbon Finding from MR Images
Abstract. Sulcal medial surfaces are 3D thin convoluted ribbons embedded in cortical sulci, and they provide distinctive anatomical features of the brain. Here we propose a new app...
Xiaolan Zeng, Lawrence H. Staib, Robert T. Schultz...
122
Voted
AI
1999
Springer
15 years 1 months ago
Learning by Discovering Concept Hierarchies
We present a new machine learning method that, given a set of training examples, induces a definition of the target concept in terms of a hierarchy of intermediate concepts and th...
Blaz Zupan, Marko Bohanec, Janez Demsar, Ivan Brat...