Sciweavers

1479 search results - page 143 / 296
» Extremal collective behavior
Sort
View
BMCBI
2006
92views more  BMCBI 2006»
15 years 4 months ago
Recrafting the neighbor-joining method
Background: The neighbor-joining method by Saitou and Nei is a widely used method for constructing phylogenetic trees. The formulation of the method gives rise to a canonical (n3)...
Thomas Mailund, Gerth Stølting Brodal, Rolf...
ICST
2010
IEEE
15 years 3 months ago
Characterizing the Chain of Evidence for Software Safety Cases: A Conceptual Model Based on the IEC 61508 Standard
— Increasingly, licensing and safety regulatory bodies require the suppliers of software-intensive, safety-critical systems to provide an explicit software safety case – a stru...
Rajwinder Kaur Panesar-Walawege, Mehrdad Sabetzade...
INFOCOM
2011
IEEE
14 years 8 months ago
Novasky: Cinematic-quality VoD in a P2P storage cloud
—In this paper, we present Novasky, a real-world Video-on-Demand (VoD) system capable of delivering cinematicquality video streams to end users. The foundation of the Novasky des...
Fangming Liu, Shijun Shen, Bo Li, Baochun Li, Hao ...
CIKM
2011
Springer
14 years 4 months ago
Citation count prediction: learning to estimate future citations for literature
In most of the cases, scientists depend on previous literature which is relevant to their research fields for developing new ideas. However, it is not wise, nor possible, to trac...
Rui Yan, Jie Tang, Xiaobing Liu, Dongdong Shan, Xi...
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
16 years 5 months ago
Relational learning via latent social dimensions
Social media such as blogs, Facebook, Flickr, etc., presents data in a network format rather than classical IID distribution. To address the interdependency among data instances, ...
Lei Tang, Huan Liu