Sciweavers

8671 search results - page 1626 / 1735
» A generator for hierarchical problems
Sort
View
AP2PS
2009
IEEE
14 years 3 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
BIBM
2009
IEEE
155views Bioinformatics» more  BIBM 2009»
14 years 3 months ago
Towards Reliable Isoform Quantification Using RNA-Seq Data
Background: In eukaryotes, alternative splicing often generates multiple splice variants from a single gene. Here weexplore the use of RNA sequencing (RNA-Seq) datasets to address...
Brian E. Howard, Steffen Heber
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
14 years 3 months ago
Instance Data Evaluation for Semantic Web-Based Knowledge Management Systems
As semantic web technologies are increasingly used to empower knowledge management systems (KMSs), there is a growing need for mechanisms and automated tools for checking content ...
Jiao Tao, Li Ding, Deborah L. McGuinness
ICDE
2009
IEEE
174views Database» more  ICDE 2009»
14 years 3 months ago
Sketching Sampled Data Streams
—Sampling is used as a universal method to reduce the running time of computations – the computation is performed on a much smaller sample and then the result is scaled to comp...
Florin Rusu, Alin Dobra
SAC
2009
ACM
14 years 3 months ago
ERIKA and open-ZB: an implementation for real-time wireless networking
IEEE 802.15.4/ZigBee and TinyOS have been playing an important role in leveraging a new generation of large-scale networked embedded systems. However, based on previous experience...
Paolo Pagano, Mangesh Chitnis, Antonio Romano, Giu...
« Prev « First page 1626 / 1735 Last » Next »