Sciweavers

10458 search results - page 1651 / 2092
» Modeling Features at Runtime
Sort
View
ISI
2008
Springer
15 years 4 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
GPEM
2000
80views more  GPEM 2000»
15 years 4 months ago
Explanatory Analysis of the Metabolome Using Genetic Programming of Simple, Interpretable Rules
Genetic programming, in conjunction with advanced analytical instruments, is a novel tool for the investigation of complex biological systems at the whole-tissue level. In this stu...
Helen E. Johnson, Richard J. Gilbert, Michael K. W...
JCB
2000
146views more  JCB 2000»
15 years 4 months ago
Bayesian Segmentation of Protein Secondary Structure
We present a novel method for predicting the secondary structure of a protein from its amino acid sequence. Most existing methods predict each position in turn based on a local wi...
Scott C. Schmidler, Jun S. Liu, Douglas L. Brutlag
MP
2002
176views more  MP 2002»
15 years 4 months ago
UOBYQA: unconstrained optimization by quadratic approximation
UOBYQA is a new algorithm for general unconstrained optimization calculations, that takes account of the curvature of the objective function, F say, by forming quadratic models by ...
M. J. D. Powell
TPDS
2010
194views more  TPDS 2010»
15 years 2 months ago
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
—This paper analyzes the potential of cooperative proxy caching for peer-to-peer (P2P) traffic as a means to ease the burden imposed by P2P traffic on Internet Service Providers ...
Mohamed Hefeeda, Behrooz Noorizadeh
« Prev « First page 1651 / 2092 Last » Next »