Sciweavers

9726 search results - page 1841 / 1946
» An Approach to Optimize Data Processing in Business Processe...
Sort
View
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 8 months ago
Efficient top-k count queries over imprecise duplicates
We propose efficient techniques for processing various TopK count queries on data with noisy duplicates. Our method differs from existing work on duplicate elimination in two sign...
Sunita Sarawagi, Vinay S. Deshpande, Sourabh Kasli...
PARA
2000
Springer
15 years 8 months ago
Experiments in Separating Computational Algorithm from Program Distribution and Communication
Our proposal has the following key features: 1) The separation of a distributed program into a pure algorithm (PurAl) and a distribution/communication declaration (DUAL). This yie...
Raphael B. Yehezkael, Yair Wiseman, H. G. Mendelba...
USENIX
2007
15 years 6 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
154
Voted
BIOINFORMATICS
2007
195views more  BIOINFORMATICS 2007»
15 years 4 months ago
Context-dependent clustering for dynamic cellular state modeling of microarray gene expression
Motivation: High-throughput expression profiling allows researchers to study gene activities globally. Genes with similar expression profiles are likely to encode proteins that ma...
Shinsheng Yuan, Ker-Chau Li
BMCBI
2010
125views more  BMCBI 2010»
15 years 4 months ago
Haplotype allelic classes for detecting ongoing positive selection
Background: Natural selection eliminates detrimental and favors advantageous phenotypes. This process leaves characteristic signatures in underlying genomic segments that can be r...
Julie Hussin, Philippe Nadeau, Jean-Françoi...
« Prev « First page 1841 / 1946 Last » Next »