Sciweavers

2135 search results - page 133 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
IPPS
2008
IEEE
14 years 2 months ago
Outlier detection in performance data of parallel applications
— When an adaptive software component is employed to select the best-performing implementation for a communication operation at runtime, the correctness of the decision taken str...
Katharina Benkert, Edgar Gabriel, Michael M. Resch
ICANN
1997
Springer
13 years 12 months ago
Topology Representing Networks for Intrinsic Dimensionality Estimation
Abstract. In this paper we compare two methods for intrinsic dimensionality (ID) estimation based on optimally topology preserving maps (OTPMs). The rst one is a direct approach, w...
Jörg Bruske, Gerald Sommer
USS
2008
13 years 10 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
BMCBI
2008
159views more  BMCBI 2008»
13 years 8 months ago
Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments
Background: Identification of differentially expressed genes is a typical objective when analyzing gene expression data. Recently, Bayesian hierarchical models have become increas...
Hongya Zhao, Kwok-Leung Chan, Lee-Ming Cheng, Hong...
JUCS
2010
121views more  JUCS 2010»
13 years 3 months ago
Real-time Analysis of Time-based Usability and Accessibility for Human Mobile-Web Interactions in the Ubiquitous Internet
: In the ubiquitous Internet, human mobile-web interactions can be evaluated with real-time analysis of time-based usability and accessibility with the different types of mobile In...
Yung Bok Kim