Sciweavers

1561 search results - page 255 / 313
» Evaluating different methods of microarray data normalizatio...
Sort
View
AINA
2007
IEEE
14 years 3 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
ITICSE
2003
ACM
14 years 2 months ago
Observations from using two modes of teaching undergraduate computer architecture
The authors present observations from using two modes of teaching undergraduate computer architecture. Two sections were taught differently: one section was taught using a traditi...
Benjoe A. Juliano, Chi-Hui Chen, Elena Kroumova
COMPSYSTECH
2007
14 years 21 days ago
A refinement model with information granulation focused on difficult to distinguish cases
: The paper proposes a different approach to data modeling. Analogous to the rejection method, where the misclassifications are removed and manually evaluated, we focus here on dif...
Plamena Andreeva, Plamen Andreev, Maya Dimitrova, ...
DSN
2008
IEEE
13 years 10 months ago
Experiences with formal specification of fault-tolerant file systems
Fault-tolerant, replicated file systems are a crucial component of today's data centers. Despite their huge complexity, these systems are typically specified only in brief pr...
Roxana Geambasu, Andrew Birrell, John MacCormick
IJCAI
2007
13 years 10 months ago
Inferring Long-term User Properties Based on Users' Location History
Recent development of location technologies enables us to obtain the location history of users. This paper proposes a new method to infer users’ longterm properties from their r...
Yutaka Matsuo, Naoaki Okazaki, Kiyoshi Izumi, Yosh...