Sciweavers

15073 search results - page 2764 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
EDBT
2008
ACM
160views Database» more  EDBT 2008»
15 years 5 months ago
Taxonomy-superimposed graph mining
New graph structures where node labels are members of hierarchically organized ontologies or taxonomies have become commonplace in different domains, e.g., life sciences. It is a ...
Ali Cakmak, Gultekin Özsoyoglu
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
15 years 5 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
ACL
2007
15 years 5 months ago
Multilingual Transliteration Using Feature based Phonetic Method
In this paper we investigate named entity transliteration based on a phonetic scoring method. The phonetic method is computed using phonetic features and carefully designed pseudo...
Su-Youn Yoon, Kyoung-Young Kim, Richard Sproat
AAAI
2010
15 years 5 months ago
Coalitional Structure Generation in Skill Games
We consider optimizing the coalition structure in Coalitional Skill Games (CSGs), a succinct representation of coalitional games (Bachrach and Rosenschein 2008). In CSGs, the valu...
Yoram Bachrach, Reshef Meir, Kyomin Jung, Pushmeet...
119
Voted
BIOCOMP
2008
15 years 5 months ago
Identifying Protein Flexibility by NMA
- Here proposed apriori method for identification of protein flexibility relies on one end-state conformation of the protein. This method has comparative advantage over many others...
Kresimir Sikic, Branko Jeren, Sanja Tomic
« Prev « First page 2764 / 3015 Last » Next »