Sciweavers

28888 search results - page 5521 / 5778
» Computability and complexity in analysis
Sort
View
SIGCOMM
2010
ACM
15 years 4 months ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
ICPR
2010
IEEE
15 years 4 months ago
Incorporating Linguistic Model Adaptation into Whole-Book Recognition
Abstract—Whole-book recognition is a document image analysis strategy that operates on the complete set of a book’s page images using automatic adaptation to improve accuracy. ...
Pingping Xiu, Henry S. Baird
155
Voted
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
16 years 3 months ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
BMCBI
2010
148views more  BMCBI 2010»
15 years 4 months ago
Calling SNPs without a reference sequence
Background: The most common application for the next-generation sequencing technologies is resequencing, where short reads from the genome of an individual are aligned to a refere...
Aakrosh Ratan, Yu Zhang, Vanessa M. Hayes, Stephan...
BMCBI
2010
116views more  BMCBI 2010»
15 years 4 months ago
permGPU: Using graphics processing units in RNA microarray association studies
Background: Many analyses of microarray association studies involve permutation, bootstrap resampling and crossvalidation, that are ideally formulated as embarrassingly parallel c...
Ivo D. Shterev, Sin-Ho Jung, Stephen L. George, Ko...
« Prev « First page 5521 / 5778 Last » Next »