Sciweavers

7839 search results - page 1212 / 1568
» What's there and what's not
Sort
View
112
Voted
IEEESP
2010
126views more  IEEESP 2010»
15 years 12 days ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
IGPL
2010
98views more  IGPL 2010»
15 years 11 days ago
Science: the rules of the game
: Popper s suggestion of taking methodological norms as conventions is examined from the point of view of game theory. The game of research is interpreted as a game of persuasion, ...
Jesús Zamora-Bonilla
IJAR
2010
113views more  IJAR 2010»
15 years 11 days ago
A geometric view on learning Bayesian network structures
We recall the basic idea of an algebraic approach to learning Bayesian network (BN) structures, namely to represent every BN structure by a certain (uniquely determined) vector, c...
Milan Studený, Jirí Vomlel, Raymond ...
IJBRA
2010
89views more  IJBRA 2010»
15 years 11 days ago
Strategies for enhanced annotation of a microarray probe set
—We aim to determine the biological relevance of genes identified through microarray-mediated transcriptional profiling of Xenopus sensory organs and brain tissue. Genetic data...
TuShun R. Powers, Selene M. Virk, Elba E. Serrano
112
Voted
IJCCBS
2010
105views more  IJCCBS 2010»
15 years 11 days ago
Software safety: relating software assurance and software integrity
: The overall safety integrity of a safety critical system, comprising both software and hardware, is typically specified quantitatively, e.g., in terms of failure rates. However, ...
Ibrahim Habli, Richard Hawkins, Tim Kelly
« Prev « First page 1212 / 1568 Last » Next »