Sciweavers

790 search results - page 134 / 158
» Recommender systems for the conference paper assignment prob...
Sort
View
SACMAT
2006
ACM
15 years 3 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
15 years 3 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert
BMCBI
2008
149views more  BMCBI 2008»
14 years 10 months ago
All-paths graph kernel for protein-protein interaction extraction with evaluation of cross-corpus learning
Background: Automated extraction of protein-protein interactions (PPI) is an important and widely studied task in biomedical text mining. We propose a graph kernel based approach ...
Antti Airola, Sampo Pyysalo, Jari Björne, Tap...
RECSYS
2009
ACM
15 years 4 months ago
Uncovering functional dependencies in MDD-compiled product catalogues
A functional dependency is a logical relationship amongst the attributes that define a table of data. Specifically, a functional dependency holds when the values of a subset of ...
Tarik Hadzic, Barry O'Sullivan
SASO
2008
IEEE
15 years 4 months ago
Towards Desynchronization of Multi-hop Topologies
In this paper we study desynchronization, a closelyrelated primitive to graph coloring. A valid graph coloring is an assignment of colors to nodes such that no node’s color is t...
Julius Degesys, Radhika Nagpal