Sciweavers

2620 search results - page 522 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
PEWASUN
2007
ACM
13 years 9 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
ACL
2006
13 years 9 months ago
Morphological Richness Offsets Resource Demand - Experiences in Constructing a POS Tagger for Hindi
In this paper we report our work on building a POS tagger for a morphologically rich language- Hindi. The theme of the research is to vindicate the stand that- if morphology is st...
Smriti Singh, Kuhoo Gupta, Manish Shrivastava, Pus...
SIGCOMM
2010
ACM
13 years 7 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
BMCBI
2008
135views more  BMCBI 2008»
13 years 7 months ago
Using Generalized Procrustes Analysis (GPA) for normalization of cDNA microarray data
Background: Normalization is essential in dual-labelled microarray data analysis to remove nonbiological variations and systematic biases. Many normalization methods have been use...
Huiling Xiong, Dapeng Zhang, Christopher J. Martyn...
BMCBI
2006
152views more  BMCBI 2006»
13 years 7 months ago
Amplification of the Gene Ontology annotation of Affymetrix probe sets
Background: The annotations of Affymetrix DNA microarray probe sets with Gene Ontology terms are carefully selected for correctness. This results in very accurate but incomplete a...
Enrique M. Muro, Carolina Perez-Iratxeta, Miguel A...