Sciweavers

5934 search results - page 1185 / 1187
» Detecting a Network Failure
Sort
View
SOCIALCOM
2010
13 years 8 months ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 8 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
BMCBI
2010
100views more  BMCBI 2010»
13 years 8 months ago
New insights into protein-protein interaction data lead to increased estimates of the S. cerevisiae interactome size
Background: As protein interactions mediate most cellular mechanisms, protein-protein interaction networks are essential in the study of cellular processes. Consequently, several ...
Laure Sambourg, Nicolas Thierry-Mieg
FIRSTMONDAY
2010
163views more  FIRSTMONDAY 2010»
13 years 8 months ago
Bubbles, gullibility, and other challenges for economics, psychology, sociology, and information sciences
Abstract. Gullibility is the principal cause of bubbles. Investors and the general public get snared by a "beautiful illusion" and throw caution to the wind. Attempts to ...
Andrew M. Odlyzko
BMCBI
2011
13 years 5 months ago
The impact of quantitative optimization of hybridization conditions on gene expression analysis
Background: With the growing availability of entire genome sequences, an increasing number of scientists can exploit oligonucleotide microarrays for genome-scale expression studie...
Peter Sykacek, David P. Kreil, Lisa A. Meadows, Ri...
« Prev « First page 1185 / 1187 Last » Next »