Sciweavers

795 search results - page 155 / 159
» On the value of threshold signatures
Sort
View
CORR
2010
Springer
122views Education» more  CORR 2010»
14 years 9 months ago
Harvesting Collective Intelligence: Temporal Behavior in Yahoo Answers
When harvesting collective intelligence, a user wishes to maximize the accuracy and value of the acquired information without spending too much time collecting it. We empirically ...
Christina Aperjis, Bernardo A. Huberman, Fang Wu
CORR
2010
Springer
160views Education» more  CORR 2010»
14 years 9 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
BMCBI
2006
116views more  BMCBI 2006»
14 years 9 months ago
Gene annotation and network inference by phylogenetic profiling
Background: Phylogenetic analysis is emerging as one of the most informative computational methods for the annotation of genes and identification of evolutionary modules of functi...
Jie Wu, Zhenjun Hu, Charles DeLisi
IANDC
2008
92views more  IANDC 2008»
14 years 9 months ago
Tree exploration with advice
We study the amount of knowledge about the network that is required in order to efficiently solve a task concerning this network. The impact of available information on the effici...
Pierre Fraigniaud, David Ilcinkas, Andrzej Pelc
BMCBI
2007
178views more  BMCBI 2007»
14 years 9 months ago
SVM clustering
Background: Support Vector Machines (SVMs) provide a powerful method for classification (supervised learning). Use of SVMs for clustering (unsupervised learning) is now being cons...
Stephen Winters-Hilt, Sam Merat