Sciweavers

1054 search results - page 196 / 211
» From Mobility Management to Connectivity Management
Sort
View
CIKM
2007
Springer
13 years 11 months ago
A segment-based hidden markov model for real-setting pinyin-to-chinese conversion
Hidden markov model (HMM) is frequently used for Pinyin-toChinese conversion. But it only captures the dependency with the preceding character. Higher order markov models can brin...
Xiaohua Zhou, Xiaohua Hu, Xiaodan Zhang, Xiajiong ...
BMCBI
2006
184views more  BMCBI 2006»
13 years 7 months ago
PathSys: integrating molecular interaction graphs for systems biology
Background: The goal of information integration in systems biology is to combine information from a number of databases and data sets, which are obtained from both high and low th...
Michael Baitaluk, Xufei Qian, Shubhada Godbole, Al...
MAM
2007
127views more  MAM 2007»
13 years 7 months ago
Indoor solar energy harvesting for sensor network router nodes
A unique method has been developed to scavenge solar energy from monocrystalline solar cells to power wireless router nodes that are used in indoor applications. This method elimi...
Abhiman Hande, Todd Polk, William Walker, Dinesh B...
KDD
2001
ACM
142views Data Mining» more  KDD 2001»
14 years 8 months ago
TreeDT: gene mapping by tree disequilibrium test
We introduce and evaluate TreeDT, a novel gene mapping method which is based on discovering and assessing tree-like patterns in genetic marker data. Gene mapping aims at discoveri...
Petteri Sevon, Hannu Toivonen, Vesa Ollikainen
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 2 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...