Sciweavers

8243 search results - page 1498 / 1649
» Can We Manage Trust
Sort
View
ISCAPDCS
2003
13 years 11 months ago
N-Tuple Compression: A Novel Method for Compression of Branch Instruction Traces
Branch predictors and processor front-ends have been the focus of a number of computer architecture studies. Typically they are evaluated separately from other components using tr...
Aleksandar Milenkovic, Milena Milenkovic, Jeffrey ...
SODA
1996
ACM
157views Algorithms» more  SODA 1996»
13 years 11 months ago
Routing and Admission Control in General Topology Networks with Poisson Arrivals
Emerging high speed networks will carry tra c for services such as video-on-demand and video teleconferencing that require resource reservation along the path on which the tra c i...
Anil Kamath, Omri Palmon, Serge A. Plotkin
BMCBI
2008
108views more  BMCBI 2008»
13 years 10 months ago
Signature Evaluation Tool (SET): a Java-based tool to evaluate and visualize the sample discrimination abilities of gene express
Background: The identification of specific gene expression signature for distinguishing sample groups is a dominant field in cancer research. Although a number of tools have been ...
Chih-Hung Jen, Tsun-Po Yang, Chien-Yi Tung, Shu-Ha...
BMCBI
2008
201views more  BMCBI 2008»
13 years 10 months ago
A copula method for modeling directional dependence of genes
Background: Genes interact with each other as basic building blocks of life, forming a complicated network. The relationship between groups of genes with different functions can b...
Jong-Min Kim, Yoon-Sung Jung, Engin A. Sungur, Kap...
CN
2008
106views more  CN 2008»
13 years 10 months ago
Efficient virtual-backbone routing in mobile ad hoc networks
Since the physical topology of Mobile Ad hoc Networks (MANETs) is generally unstable, an appealing approach is the construction of a stable and robust virtual topology or backbone...
Jamal N. Al-Karaki, Ahmed E. Kamal
« Prev « First page 1498 / 1649 Last » Next »