Sciweavers

3096 search results - page 110 / 620
» Theory and Use of the EM Algorithm
Sort
View
PODS
2009
ACM
130views Database» more  PODS 2009»
16 years 5 months ago
The finite model theory toolbox of a database theoretician
For many years, finite model theory was viewed as the backbone of database theory, and database theory in turn supplied finite model theory with key motivations and problems. By n...
Leonid Libkin
ISMVL
2009
IEEE
161views Hardware» more  ISMVL 2009»
15 years 11 months ago
Mining Approximative Descriptions of Sets Using Rough Sets
Using concepts from rough set theory we investigate the existence of approximative descriptions of collections of objects that can be extracted from data sets, a problem of intere...
Dan A. Simovici, Selim Mimaroglu
AAECC
2006
Springer
109views Algorithms» more  AAECC 2006»
15 years 4 months ago
Cryptosystems using Linear Groups
Several suggestions are presented for developing cryptosystems, both classical and public key, using a combination of combinatorial group theory and linear groups. In particular, t...
Gilbert Baumslag, Benjamin Fine, Xiaowei Xu
ICASSP
2010
IEEE
15 years 4 months ago
Optimized intrinsic dimension estimator using nearest neighbor graphs
We develop an approach to intrinsic dimension estimation based on k-nearest neighbor (kNN) distances. The dimension estimator is derived using a general theory on functionals of k...
Kumar Sricharan, Raviv Raich, Alfred O. Hero III
CICLING
2010
Springer
15 years 9 months ago
Extraction of Genic Interactions with the Recursive Logical Theory of an Ontology
We introduce an Information Extraction (IE) system which uses the logical theory of an ontology as a generalisation of the typical information extraction patterns to extract biolog...
Alain-Pierre Manine, Érick Alphonse, Philip...