Sciweavers

2829 search results - page 546 / 566
» Regularization Methods for Additive Models
Sort
View
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 1 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
88
Voted
CONCUR
2006
Springer
15 years 1 months ago
Sanity Checks in Formal Verification
One of the advantages of temporal-logic model-checking tools is their ability to accompany a negative answer to the correctness query by a counterexample to the satisfaction of the...
Orna Kupferman
BMCBI
2007
113views more  BMCBI 2007»
14 years 9 months ago
Statistical power of phylo-HMM for evolutionarily conserved element detection
Background: An important goal of comparative genomics is the identification of functional elements through conservation analysis. Phylo-HMM was recently introduced to detect conse...
Xiaodan Fan, Jun Zhu, Eric E. Schadt, Jun S. Liu
BMCBI
2005
122views more  BMCBI 2005»
14 years 9 months ago
Bayesian coestimation of phylogeny and sequence alignment
Background: Two central problems in computational biology are the determination of the alignment and phylogeny of a set of biological sequences. The traditional approach to this p...
Gerton Lunter, István Miklós, Alexei...

Publication
181views
14 years 5 months ago
Causality Applicatoin Ontology: A Therory of Definition Derived From Analytical Meditation
Advancing the synthesis of Eastern mind science with Western physical science will require a robust and easy-to-traverse bridge between the atypical apprehensions within meditation...
Samuel R Dismond III