Sciweavers

3318 search results - page 347 / 664
» The Weak Instance Model
Sort
View
BIOINFORMATICS
2004
86views more  BIOINFORMATICS 2004»
15 years 4 months ago
Transposable element annotation of the rice genome
Motivation: The high content of repetitive sequences in the genomes of many higher eukaryotes renders the task of annotating them computationally intensive. Presently, the only wi...
Nikoleta Juretic, Thomas E. Bureau, Richard M. Bru...
MCS
2002
Springer
15 years 4 months ago
New Measure of Classifier Dependency in Multiple Classifier Systems
Abstract. Recent findings in the domain of combining classifiers provide a surprising revision of the usefulness of diversity for modelling combined performance. Although there is ...
Dymitr Ruta, Bogdan Gabrys
RE
2002
Springer
15 years 4 months ago
Extreme Programming Modified: Embrace Requirements Engineering Practices
Extreme Programming (XP) is an agile (lightweight) software development methodology and it becomes more and more popular. XP proposes many interesting practices, but it also has s...
Jerzy R. Nawrocki, Michal Jasiñski, Bartosz...
TSMC
2002
182views more  TSMC 2002»
15 years 4 months ago
Bidder's strategy under group-buying auction on the Internet
The group-buying auction is a new kind of dynamic pricing mechanism on the Internet. It is a variant of the sellers' price double auction, which makes the bidders as a group t...
Jian Chen, Xilong Chen, Xiping Song
126
Voted
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 3 months ago
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
— We consider perfect secret key generation for a “pairwise independent network” model in which every pair of terminals share a random binary string, with the strings shared ...
Sirin Nitinawarat, Prakash Narayan