Sciweavers

2945 search results - page 184 / 589
» Noisy Network Coding
Sort
View
135
Voted
DSOM
2003
Springer
15 years 9 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
151
Voted
BIBM
2010
IEEE
158views Bioinformatics» more  BIBM 2010»
15 years 1 months ago
Protein-protein interaction prediction via Collective Matrix Factorization
Abstract--Protein-protein interactions (PPI) play an important role in cellular processes and metabolic processes within a cell. An important task is to determine the existence of ...
Qian Xu, Evan Wei Xiang, Qiang Yang
116
Voted
WETICE
2009
IEEE
15 years 10 months ago
Performance Evaluation of Grid-Enabled Code: A Case Study
—This paper presents the performance analysis of a grid-enabled MIP solver in a grid environment consisting of three clusters on a campus LAN. In particular, the paper focuses on...
Sonya Marcarelli, Emilio Pasquale Mancini, Umberto...
112
Voted
ACL
1994
15 years 5 months ago
Dual-Coding Theory and Connectionist Lexical Selection
We introduce the bilingual dual-coding theory as a model for bilingual mental representation. Based on this model, lexical selection neural networks are implemented for a connecti...
Ye-Yi Wang
149
Voted
ICML
2009
IEEE
16 years 4 months ago
Approximate inference for planning in stochastic relational worlds
Relational world models that can be learned from experience in stochastic domains have received significant attention recently. However, efficient planning using these models rema...
Tobias Lang, Marc Toussaint