Sciweavers

406 search results - page 81 / 82
» New Learning Automata Based Algorithms for Adaptation of Bac...
Sort
View
CCS
2003
ACM
13 years 11 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
CCR
2005
76views more  CCR 2005»
13 years 6 months ago
Simplifying the synthesis of internet traffic matrices
A recent paper [8] presented methods for several steps along the road to synthesis of realistic traffic matrices. Such synthesis is needed because traffic matrices are a crucial i...
Matthew Roughan
CORR
1998
Springer
125views Education» more  CORR 1998»
13 years 6 months ago
Automating Coreference: The Role of Annotated Training Data
Wereporthere ona studyof interannotatoragreementin the coreferencetask as defined by the MessageUnderstanding Conference(MUC-6and MUC-7).Basedon feedback from annotators, weclarif...
Lynette Hirschman, Patricia Robinson, John D. Burg...
MVA
2000
172views Computer Vision» more  MVA 2000»
13 years 7 months ago
Partial Face Extraction and Recognition Using Radial Basis Function Networks
work, applies a nonlinear transformation from the input space to the hidden space. The output layer Partial face images, e.g.1 eyes, nose, and ear supplies the response of the netw...
Nan He, Kiminori Sato, Yukitoshi Takahashi
BMCBI
2007
136views more  BMCBI 2007»
13 years 6 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette