Sciweavers

382 search results - page 51 / 77
» A framework for describing and understanding mining tools in...
Sort
View
CIDR
2009
102views Algorithms» more  CIDR 2009»
13 years 8 months ago
Why Did My Query Slow Down
Enterprise environments have isolated teams responsible separately for database management and the management of underlying networkattached server-storage infrastructure (referred...
Nedyalko Borisov, Sandeep Uttamchandani, Ramani Ro...
BMCBI
2010
133views more  BMCBI 2010»
13 years 7 months ago
New components of the Dictyostelium PKA pathway revealed by Bayesian analysis of expression data
Background: Identifying candidate genes in genetic networks is important for understanding regulation and biological function. Large gene expression datasets contain relevant info...
Anup Parikh, Eryong Huang, Christopher Dinh, Blaz ...
DEXAW
2003
IEEE
91views Database» more  DEXAW 2003»
14 years 27 days ago
Web Technology for Education and Training
The Internet has enabled a great amount of information to be readily available and easily accessible. It has promoted several changes in the world, including in the education area...
Sean W. M. Siqueira, Maria Helena Lima Baptista Br...
FASE
2007
Springer
14 years 1 months ago
Testing Scenario-Based Models
The play-in/play-out approach suggests a new paradigm for system development using scenario-based requirements. It allows the user to develop a high level scenario-based model of t...
Hillel Kugler, Michael J. Stern, E. Jane Albert Hu...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 1 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...