Sciweavers

2635 search results - page 327 / 527
» Computing multihomogeneous resultants using straight-line pr...
Sort
View
ASPLOS
2009
ACM
14 years 11 months ago
Producing wrong data without doing anything obviously wrong!
This paper presents a surprising result: changing a seemingly innocuous aspect of an experimental setup can cause a systems researcher to draw wrong conclusions from an experiment...
Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Pe...
BMCBI
2005
94views more  BMCBI 2005»
13 years 10 months ago
A method for finding single-nucleotide polymorphisms with allele frequencies in sequences of deep coverage
Background: The allele frequencies of single-nucleotide polymorphisms (SNPs) are needed to select an optimal subset of common SNPs for use in association studies. Sequence-based m...
Jianmin Wang, Xiaoqiu Huang
IJDE
2006
95views more  IJDE 2006»
13 years 10 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ML
2002
ACM
114views Machine Learning» more  ML 2002»
13 years 10 months ago
Building a Basic Block Instruction Scheduler with Reinforcement Learning and Rollouts
The execution order of a block of computer instructions on a pipelined machine can make a difference in running time by a factor of two or more. Compilers use heuristic schedulers...
Amy McGovern, J. Eliot B. Moss, Andrew G. Barto
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
13 years 5 months ago
A distributed Newton method for Network Utility Maximization
Most existing work uses dual decomposition and subgradient methods to solve Network Utility Maximization (NUM) problems in a distributed manner, which suffer from slow rate of con...
Ermin Wei, Asuman E. Ozdaglar, Ali Jadbabaie