Sciweavers

5101 search results - page 948 / 1021
» Analyzing medical processes
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
SIGMETRICS
2009
ACM
126views Hardware» more  SIGMETRICS 2009»
14 years 3 months ago
Self-adaptive admission control policies for resource-sharing systems
We consider the problem of admission control in resource sharing systems, such as web servers and transaction processing systems, when the job size distribution has high variabili...
Varun Gupta, Mor Harchol-Balter
BIBM
2008
IEEE
212views Bioinformatics» more  BIBM 2008»
14 years 3 months ago
Analysis of Multiplex Gene Expression Maps Obtained by Voxelation
Background: Gene expression signatures in the mammalian brain hold the key to understanding neural development and neurological disease. Researchers have previously used voxelatio...
Li An, Hongbo Xie, Mark H. Chin, Zoran Obradovic, ...
DASFAA
2008
IEEE
190views Database» more  DASFAA 2008»
14 years 3 months ago
Analysis of Time Series Using Compact Model-Based Descriptions
Abstract. Recently, we have proposed a novel method for the compression of time series based on mathematical models that explore dependencies between different time series. This r...
Hans-Peter Kriegel, Peer Kröger, Alexey Pryak...
IAT
2008
IEEE
14 years 3 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...