Sciweavers

949 search results - page 131 / 190
» Theory of Constraints
Sort
View
126
Voted
BIBM
2008
IEEE
159views Bioinformatics» more  BIBM 2008»
15 years 7 months ago
Probe Design for Compressive Sensing DNA Microarrays
Abstract—Compressive Sensing Microarrays (CSM) are DNAbased sensors that operate using group testing and compressive sensing (CS) principles. In contrast to conventional DNA micr...
Wei Dai, Olgica Milenkovic, Mona A. Sheikh, Richar...
SIGSOFT
2005
ACM
16 years 1 months ago
Relational analysis of algebraic datatypes
We present a technique that enables the use of finite model finding to check the satisfiability of certain formulas whose intended models are infinite. Such formulas arise when us...
Viktor Kuncak, Daniel Jackson
100
Voted
SACMAT
2004
ACM
15 years 6 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
105
Voted
JCP
2007
100views more  JCP 2007»
15 years 14 days ago
Extraction of Unique Independent Components for Nonlinear Mixture of Sources
—In this paper, a neural network solution to extract independent components from nonlinearly mixed signals is proposed. Firstly, a structurally constrained mixing model is introd...
Pei Gao, Li Chin Khor, Wai Lok Woo, Satnam Singh D...
109
Voted
IJCAI
2007
15 years 2 months ago
Recursive Random Fields
A formula in first-order logic can be viewed as a tree, with a logical connective at each node, and a knowledge base can be viewed as a tree whose root is a conjunction. Markov l...
Daniel Lowd, Pedro Domingos