Sciweavers

5758 search results - page 1090 / 1152
» Anonymity-preserving data collection
Sort
View
CASES
2006
ACM
14 years 2 months ago
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...
Lan S. Bai, Lei Yang, Robert P. Dick
ECCB
2005
IEEE
14 years 2 months ago
A query language for biological networks
Many areas of modern biology are concerned with the management, storage, visualization, comparison, and analysis of networks. For instance, networks are used to model signal trans...
Ulf Leser
ICDE
2005
IEEE
107views Database» more  ICDE 2005»
14 years 2 months ago
The Quality vs. Time Trade-off for Approximate Image Descriptor Search
In recent years, content-based image retrieval has become more and more important in many application areas. Similarity retrieval is inherently a very demanding process, in partic...
Rut Siguroardottir, Björn Þór J&...
ISPASS
2005
IEEE
14 years 2 months ago
BioBench: A Benchmark Suite of Bioinformatics Applications
Recent advances in bioinformatics and the significant increase in computational power available to researchers have made it possible to make better use of the vast amounts of gene...
Kursad Albayraktaroglu, Aamer Jaleel, Xue Wu, Mano...
SSDBM
2005
IEEE
175views Database» more  SSDBM 2005»
14 years 2 months ago
Assumption-Free Anomaly Detection in Time Series
Recent advancements in sensor technology have made it possible to collect enormous amounts of data in real time. However, because of the sheer volume of data most of it will never...
Li Wei, Nitin Kumar, Venkata Nishanth Lolla, Eamon...
« Prev « First page 1090 / 1152 Last » Next »