Sciweavers

5009 search results - page 988 / 1002
» Data Mining Support in Database Management Systems
Sort
View
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
12 years 4 months ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...
ISSTA
2006
ACM
14 years 2 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
BMCBI
2008
99views more  BMCBI 2008»
13 years 9 months ago
Exhaustive prediction of disease susceptibility to coding base changes in the human genome
Background: Single Nucleotide Polymorphisms (SNPs) are the most abundant form of genomic variation and can cause phenotypic differences between individuals, including diseases. Ba...
Vinayak Kulkarni, Mounir Errami, Robert Barber, Ha...
BMCBI
2008
116views more  BMCBI 2008»
13 years 9 months ago
Gene Ontology annotations: what they mean and where they come from
To address the challenges of information integration and retrieval, the computational genomics community increasingly has come to rely on the methodology of creating annotations o...
David P. Hill, Barry Smith, Monica S. McAndrews-Hi...
IUI
2010
ACM
14 years 3 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka