Sciweavers

473 search results - page 85 / 95
» From experiment design to closed-loop control
Sort
View
BMCBI
2006
86views more  BMCBI 2006»
13 years 8 months ago
The impact of sample imbalance on identifying differentially expressed genes
Background: Recently several statistical methods have been proposed to identify genes with differential expression between two conditions. However, very few studies consider the p...
Kun Yang, Jianzhong Li, Hong Gao
TON
2008
136views more  TON 2008»
13 years 7 months ago
A geometric approach to improving active packet loss measurement
Abstract-- Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. Whi...
Joel Sommers, Paul Barford, Nick G. Duffield, Amos...
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
JAVA
1999
Springer
14 years 7 days ago
Interfacing Java to the Virtual Interface Architecture
User-level network interfaces (UNIs) have reduced the overheads of communication by exposing the buffers used by the network interface DMA engine to the applications. This removes...
Chi-Chao Chang, Thorsten von Eicken
BMCBI
2010
143views more  BMCBI 2010»
13 years 8 months ago
Evaluation of methods for detection of fluorescence labeled subcellular objects in microscope images
Background: Several algorithms have been proposed for detecting fluorescently labeled subcellular objects in microscope images. Many of these algorithms have been designed for spe...
Pekka Ruusuvuori, Tarmo Äijö, Sharif Cho...