Sciweavers

6812 search results - page 1294 / 1363
» Detection of Information Flows
Sort
View
WSDM
2012
ACM
243views Data Mining» more  WSDM 2012»
12 years 3 months ago
No search result left behind: branching behavior with browser tabs
Today’s Web browsers allow users to open links in new windows or tabs. This action, which we call ‘branching’, is sometimes performed on search results when the user plans t...
Jeff Huang, Thomas Lin, Ryen W. White
WSDM
2012
ACM
325views Data Mining» more  WSDM 2012»
12 years 3 months ago
Coupled temporal scoping of relational facts
Recent research has made significant advances in automatically constructing knowledge bases by extracting relational facts (e.g., Bill Clinton-presidentOf-US) from large text cor...
Partha Pratim Talukdar, Derry Tanti Wijaya, Tom Mi...
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
EDBT
2012
ACM
246views Database» more  EDBT 2012»
11 years 10 months ago
"Cut me some slack": latency-aware live migration for databases
Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. I...
Sean Kenneth Barker, Yun Chi, Hyun Jin Moon, Hakan...
BMCBI
2005
121views more  BMCBI 2005»
13 years 7 months ago
Comparison of seven methods for producing Affymetrix expression scores based on False Discovery Rates in disease profiling data
Background: A critical step in processing oligonucleotide microarray data is combining the information in multiple probes to produce a single number that best captures the express...
Kerby Shedden, Wei Chen, Rork Kuick, Debashis Ghos...
« Prev « First page 1294 / 1363 Last » Next »