Sciweavers

357 search results - page 43 / 72
» Enhanced sharing analysis techniques: a comprehensive evalua...
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 5 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
BMCBI
2008
126views more  BMCBI 2008»
13 years 7 months ago
ISOL@: an Italian SOLAnaceae genomics resource
Background: Present-day `-omics' technologies produce overwhelming amounts of data which include genome sequences, information on gene expression (transcripts and proteins) a...
Maria Luisa Chiusano, Nunzio D'Agostino, Alessandr...
DRM
2008
Springer
13 years 9 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto
ISCA
1997
IEEE
135views Hardware» more  ISCA 1997»
13 years 12 months ago
The Design and Analysis of a Cache Architecture for Texture Mapping
The effectiveness of texture mapping in enhancing the realism of computer generated imagery has made support for real-time texture mapping a critical part of graphics pipelines. D...
Ziyad S. Hakura, Anoop Gupta