Sciweavers

589 search results - page 114 / 118
» On the Use of Combining Rules in Relational Probability Tree...
Sort
View
IPL
2010
98views more  IPL 2010»
14 years 8 months ago
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, and the output key-stream is a relatively simple function of the state. In ...
Nathan Keller, Stephen D. Miller
WWW
2001
ACM
15 years 10 months ago
Intelligent crawling on the World Wide Web with arbitrary predicates
The enormous growth of the world wide web in recent years has made it important to perform resource discovery e ciently. Consequently, several new ideas have been proposed in rece...
Charu C. Aggarwal, Fatima Al-Garawi, Philip S. Yu
RECOMB
2004
Springer
15 years 10 months ago
Designing multiple simultaneous seeds for DNA similarity search
The challenge of similarity search in massive DNA sequence databases has inspired major changes in BLAST-style alignment tools, which accelerate search by inspecting only pairs of...
Yanni Sun, Jeremy Buhler
ISAAC
2004
Springer
115views Algorithms» more  ISAAC 2004»
15 years 3 months ago
Randomized Algorithms for Motif Detection
Motivation: Motif detection for DNA sequences has many important applications in biological studies, e.g., locating binding sites and regulatory signals, and designing genetic prob...
Lusheng Wang, Liang Dong, Hui Fan
JCST
2006
99views more  JCST 2006»
14 years 9 months ago
A Dialectal Chinese Speech Recognition Framework
Abstract A framework for dialectal Chinese speech recognition is proposed and studied, in which a relatively small dialectal Chinese (or in other words Chinese influenced by the na...
Jing Li, Thomas Zheng, William Byrne, Daniel Juraf...