Sciweavers

1103 search results - page 41 / 221
» Evaluating CBR Systems Using Different Data Sources: A Case ...
Sort
View
SAMOS
2005
Springer
14 years 1 months ago
A Case for Visualization-Integrated System-Level Design Space Exploration
Design space exploration plays an essential role in the system-level design of embedded systems. It is imperative therefore to have efficient and effective exploration tools in th...
Andy D. Pimentel
BMCBI
2006
200views more  BMCBI 2006»
13 years 8 months ago
Comparison and evaluation of methods for generating differentially expressed gene lists from microarray data
Background: Numerous feature selection methods have been applied to the identification of differentially expressed genes in microarray data. These include simple fold change, clas...
Ian B. Jeffery, Desmond G. Higgins, Aedín C...
ECIS
2003
13 years 9 months ago
Reflections on the use of grounded theory in interpretive information systems research
In Information Systems research there are a growing number of studies that must necessarily draw upon the contexts, experiences and narratives of practitioners. This calls for res...
Jim Hughes, Steven Jones
BIOSURVEILLANCE
2007
Springer
14 years 2 months ago
Assessing Seasonal Variation in Multisource Surveillance Data: Annual Harmonic Regression
A significant proportion of human diseases, spanning the gamut from viral respiratory disease to arthropod-borne macroparasitic infections of the blood, exhibit distinct and stable...
Eric Lofgren, Nina Fefferman, Meena Doshi, Elena N...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine