Sciweavers

15073 search results - page 171 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
128
Voted
CCS
2008
ACM
15 years 5 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
142
Voted
BMCBI
2004
150views more  BMCBI 2004»
15 years 3 months ago
Cross-species comparison significantly improves genome-wide prediction of cis-regulatory modules in Drosophila
Background: The discovery of cis-regulatory modules in metazoan genomes is crucial for understanding the connection between genes and organism diversity. It is important to quanti...
Saurabh Sinha, Mark D. Schroeder, Ulrich Unnerstal...
ICARCV
2008
IEEE
170views Robotics» more  ICARCV 2008»
15 years 10 months ago
A fast Monte Carlo algorithm for collision probability estimation
—In order to navigate safely, it is important to detect and to react to a potentially dangerous situation. Such a situation can be underlined by a judicious use of the locations ...
Alain Lambert, Dominique Gruyer, Guillaume Saint-P...
142
Voted
FOCS
2003
IEEE
15 years 9 months ago
List-Decoding Using The XOR Lemma
We show that Yao’s XOR Lemma, and its essentially equivalent rephrasing as a Direct Product Lemma, can be re-interpreted as a way of obtaining error-correcting codes with good l...
Luca Trevisan
115
Voted
DLOG
2010
15 years 1 months ago
Role-depth Bounded Least Common Subsumers by Completion for EL- and prob-EL-TBoxes
The least common subsumer (lcs) w.r.t general EL-TBoxes does not need to exists in general due to cyclic axioms. In this paper we present an algorithm for computing role-depth boun...
Anni-Yasmin Turhan, Rafael Peñaloza