Sciweavers

940 search results - page 133 / 188
» Evaluating E-Commerce Cluster Architectures Using Simulation
Sort
View
TASLP
2010
109views more  TASLP 2010»
13 years 8 months ago
Model-Based Expectation-Maximization Source Separation and Localization
Abstract—This paper describes a system, referred to as modelbased expectation-maximization source separation and localization (MESSL), for separating and localizing multiple soun...
Michael I. Mandel, Ron J. Weiss, Daniel P. W. Elli...
CSB
2003
IEEE
106views Bioinformatics» more  CSB 2003»
14 years 3 months ago
Reconstruction of Ancestral Gene Order after Segmental Duplication and Gene Loss
As gene order evolves through a variety of chromosomal rearrangements, conserved segments provide important insight into evolutionary relationships and functional roles of genes. ...
Jun Huan, Jan Prins, Wei Wang 0010, Todd J. Vision
JAMIA
2011
68views more  JAMIA 2011»
13 years 25 days ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
SC
1992
ACM
14 years 2 months ago
Willow: A Scalable Shared Memory Multiprocessor
We are currently developing Willow, a shared-memory multiprocessor whose design provides system capacity and performance capable of supporting over a thousand commercial microproc...
John K. Bennett, Sandhya Dwarkadas, Jay A. Greenwo...
INFOCOM
1992
IEEE
14 years 2 months ago
An Assessment of State and Lookup Overhead in Routers
The current Internet is based on a stateless (datagram) architecture. However, many recent proposals rely on the maintenance of state information within network routers, leading t...
Deborah Estrin, Danny J. Mitzel