Sciweavers

2829 search results - page 546 / 566
» Regularization Methods for Additive Models
Sort
View
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 3 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
101
Voted
CONCUR
2006
Springer
15 years 3 months ago
Sanity Checks in Formal Verification
One of the advantages of temporal-logic model-checking tools is their ability to accompany a negative answer to the correctness query by a counterexample to the satisfaction of the...
Orna Kupferman
BMCBI
2007
113views more  BMCBI 2007»
14 years 11 months ago
Statistical power of phylo-HMM for evolutionarily conserved element detection
Background: An important goal of comparative genomics is the identification of functional elements through conservation analysis. Phylo-HMM was recently introduced to detect conse...
Xiaodan Fan, Jun Zhu, Eric E. Schadt, Jun S. Liu
BMCBI
2005
122views more  BMCBI 2005»
14 years 11 months ago
Bayesian coestimation of phylogeny and sequence alignment
Background: Two central problems in computational biology are the determination of the alignment and phylogeny of a set of biological sequences. The traditional approach to this p...
Gerton Lunter, István Miklós, Alexei...

Publication
181views
14 years 7 months ago
Causality Applicatoin Ontology: A Therory of Definition Derived From Analytical Meditation
Advancing the synthesis of Eastern mind science with Western physical science will require a robust and easy-to-traverse bridge between the atypical apprehensions within meditation...
Samuel R Dismond III