Sciweavers

43264 search results - page 132 / 8653
» Comparing models of computation
Sort
View
BMCBI
2008
166views more  BMCBI 2008»
13 years 9 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
ICCAD
2003
IEEE
175views Hardware» more  ICCAD 2003»
14 years 5 months ago
Path Delay Estimation using Power Supply Transient Signals: A Comparative Study using Fourier and Wavelet Analysis
Transient Signal Analysis (TSA) is a parametric device testing technique based on the analysis of dynamic (transient) current (iDDT) drawn by the core logic from the power supply ...
Abhishek Singh, Jitin Tharian, Jim Plusquellic
TON
2008
155views more  TON 2008»
13 years 8 months ago
A comparative analysis of server selection in content replication networks
Server selection plays an essential role in content replication networks, such as peer-to-peer (P2P) and content delivery networks (CDNs). In this paper, we perform an analytical i...
Tao Wu, David Starobinski
ICCS
2005
Springer
14 years 2 months ago
Cost Model and Adaptive Scheme for Publish/Subscribe Systems on Mobile Grid Environments
Abstract. Publish/subscribe model is appropriate in many push based data dissemination applications. This paper presents cost model for publish/subscribe systems, analyze its perfo...
Sangyoon Oh, Sangmi Lee Pallickara, Sung Hoon Ko, ...
ENTCS
2007
110views more  ENTCS 2007»
13 years 9 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone