Sciweavers

9503 search results - page 1892 / 1901
» Authenticated System Calls
Sort
View
PDP
2011
IEEE
13 years 1 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...
BMCBI
2011
13 years 1 months ago
PeakRanger: A cloud-enabled peak caller for ChIP-seq data
Background: Chromatin immunoprecipitation (ChIP), coupled with massively parallel short-read sequencing (seq) is used to probe chromatin dynamics. Although there are many algorith...
Xin Feng, Robert Grossman, Lincoln Stein
BMCBI
2011
13 years 1 months ago
To aggregate or not to aggregate high-dimensional classifiers
Background: High-throughput functional genomics technologies generate large amount of data with hundreds or thousands of measurements per sample. The number of sample is usually m...
Cheng-Jian Xu, Huub C. J. Hoefsloot, Age K. Smilde
CHI
2011
ACM
13 years 1 months ago
Apolo: making sense of large network data by combining rich user interaction and machine learning
Extracting useful knowledge from large network datasets has become a fundamental challenge in many domains, from scientific literature to social networks and the web. We introduc...
Duen Horng Chau, Aniket Kittur, Jason I. Hong, Chr...
CISS
2011
IEEE
13 years 1 months ago
Characterizing multiplexing and diversity in visual MIMO
—Mobile optical wireless has so far been limited to very short ranges for high data rate systems. It may be feasible to overcome the data rate limitations over large transmission...
Ashwin Ashok, Marco Gruteser, Narayan B. Mandayam,...
« Prev « First page 1892 / 1901 Last » Next »