Sciweavers

1344 search results - page 193 / 269
» Cluster Analysis of High-Dimensional Data: A Case Study
Sort
View
ASIAMS
2008
IEEE
13 years 9 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
BMCBI
2005
112views more  BMCBI 2005»
13 years 7 months ago
Vector analysis as a fast and easy method to compare gene expression responses between different experimental backgrounds
Background: Gene expression studies increasingly compare expression responses between different experimental backgrounds (genetic, physiological, or phylogenetic). By focusing on ...
Rainer Breitling, Patrick Armengaud, Anna Amtmann
DRM
2003
Springer
14 years 29 days ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
CONCURRENCY
2002
89views more  CONCURRENCY 2002»
13 years 7 months ago
MyPYTHIA: a recommendation portal for scientific software and services
In this paper, we outline the design of a recommendation system (MyPYTHIA) implemented as a web portal. MyPYTHIA's design objectives include evaluating the quality and perfor...
Elias N. Houstis, Ann Christine Catlin, Nitesh Dha...
MOBICOM
1999
ACM
14 years 2 days ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph