Sciweavers

4270 search results - page 823 / 854
» A Permutation Approach to Validation
Sort
View
124
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...
VEE
2010
ACM
204views Virtualization» more  VEE 2010»
15 years 3 months ago
Energy-efficient storage in virtual machine environments
Current trends in increasing storage capacity and virtualization of resources combined with the need for energy efficiency put a challenging task in front of system designers. Pre...
Lei Ye, Gen Lu, Sushanth Kumar, Chris Gniady, John...
132
Voted
BIOINFORMATICS
2007
117views more  BIOINFORMATICS 2007»
15 years 3 months ago
Mining biological networks for unknown pathways
Biological pathways provide significant insights on the interaction mechanisms of molecules. Presently, many essential pathways still remain unknown or incomplete for newly sequen...
Ali Cakmak, Gultekin Özsoyoglu
127
Voted
BMCBI
2010
132views more  BMCBI 2010»
15 years 3 months ago
Error margin analysis for feature gene extraction
Background: Feature gene extraction is a fundamental issue in microarray-based biomarker discovery. It is normally treated as an optimization problem of finding the best predictiv...
Chi Kin Chow, Hai Long Zhu, Jessica Lacy, Winston ...
127
Voted
BMCBI
2010
117views more  BMCBI 2010»
15 years 3 months ago
Identification of NAD interacting residues in proteins
Background: Small molecular cofactors or ligands play a crucial role in the proper functioning of cells. Accurate annotation of their target proteins and binding sites is required...
Hifzur Rahman Ansari, Gajendra P. S. Raghava