Sciweavers

193 search results - page 23 / 39
» Members of Random Closed Sets
Sort
View
CCS
2001
ACM
15 years 5 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
BMCBI
2006
144views more  BMCBI 2006»
15 years 22 days ago
ProFAT: a web-based tool for the functional annotation of protein sequences
Background: The functional annotation of proteins relies on published information concerning their close and remote homologues in sequence databases. Evidence for remote sequence ...
Charles Richard Bradshaw, Vineeth Surendranath, Bi...
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
16 years 1 months ago
Bypass rates: reducing query abandonment using negative inferences
We introduce a new approach to analyzing click logs by examining both the documents that are clicked and those that are bypassed--documents returned higher in the ordering of the ...
Atish Das Sarma, Sreenivas Gollapudi, Samuel Ieong
106
Voted
ESA
2009
Springer
90views Algorithms» more  ESA 2009»
15 years 7 months ago
Storing a Compressed Function with Constant Time Access
We consider the problem of representing, in a space-efficient way, a function f : S → Σ such that any function value can be computed in constant time on a RAM. Specifically, ou...
Jóhannes B. Hreinsson, Morten Krøyer...
IWCMC
2009
ACM
15 years 7 months ago
Quantized transmit beamforming with antenna selection in a MIMO channel
For a point-to-point multi-input multi-output (MIMO) wireless channel, we propose a feedback scheme, which consists of transmit-antenna selection algorithm and beamforming quantiz...
Wiroonsak Santipach