Sciweavers

771 search results - page 149 / 155
» Access Methods and Query Processing Techniques
Sort
View
BMCBI
2005
99views more  BMCBI 2005»
13 years 7 months ago
CGH-Profiler: Data mining based on genomic aberration profiles
Background: CGH-Profiler is a program that supports the analysis of genomic aberrations measured by Comparative Genomic Hybridisation (CGH). Comparative genomic hybridisation (CGH...
Falk Schubert, Bernhard Tausch, Stefan Joos, Rolan...
NETGAMES
2005
ACM
14 years 29 days ago
Dissecting server-discovery traffic patterns generated by multiplayer first person shooter games
We study the ‘background traffic’ resulting from tens of thousands of networked first person shooter (FPS) clients searching for servers on which to play. Networked, multiplay...
Sebastian Zander, David Kennedy, Grenville J. Armi...
BMCBI
2010
91views more  BMCBI 2010»
13 years 7 months ago
Ranked retrieval of Computational Biology models
Background: The study of biological systems demands computational support. If targeting a biological problem, the reuse of existing computational models can save time and effort. ...
Ron Henkel, Lukas Endler, Andre Peters, Nicolas Le...
JAMIA
2011
98views more  JAMIA 2011»
12 years 10 months ago
Mapping clinical phenotype data elements to standardized metadata repositories and controlled terminologies: the eMERGE Network
Background Systematic study of clinical phenotypes is important for a better understanding of the genetic basis of human diseases and more effective gene-based disease management....
Jyotishman Pathak, Janey Wang, Sudha Kashyap, Meli...
SIGIR
2012
ACM
11 years 9 months ago
Search, interrupted: understanding and predicting search task continuation
Many important search tasks require multiple search sessions to complete. Tasks such as travel planning, large purchases, or job searches can span hours, days, or even weeks. Inev...
Eugene Agichtein, Ryen W. White, Susan T. Dumais, ...