Sciweavers

745 search results - page 145 / 149
» Comparing Two Approaches for the Recognition of Temporal Exp...
Sort
View
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 8 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed
ITIIS
2008
151views more  ITIIS 2008»
13 years 8 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
BMCBI
2004
131views more  BMCBI 2004»
13 years 8 months ago
A web services choreography scenario for interoperating bioinformatics applications
Background: Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applic...
Remko de Knikker, Youjun Guo, Jin-long Li, Albert ...
APPROX
2007
Springer
77views Algorithms» more  APPROX 2007»
14 years 3 months ago
High Entropy Random Selection Protocols
We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high en...
Harry Buhrman, Matthias Christandl, Michal Kouck&y...
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 9 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal