Sciweavers

9359 search results - page 1837 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
BMCBI
2006
127views more  BMCBI 2006»
13 years 8 months ago
Using local gene expression similarities to discover regulatory binding site modules
Background: We present an approach designed to identify gene regulation patterns using sequence and expression data collected for Saccharomyces cerevisae. Our main goal is to rela...
Bartek Wilczynski, Torgeir R. Hvidsten, Andriy Kry...
CCR
2006
76views more  CCR 2006»
13 years 8 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
COMCOM
2006
86views more  COMCOM 2006»
13 years 8 months ago
Study on nominee selection for multicast congestion control
Nominee selection plays a key role in nominee-based congestion control, which is essential for multicast services to ensure fairness and congestion avoidance. Without valid design...
Feng Xie, Gang Feng, Chee Kheong Siew
CAL
2007
13 years 7 months ago
Physical Register Reference Counting
—Several recently proposed techniques including CPR (Checkpoint Processing and Recovery) and NoSQ (No Store Queue) rely on reference counting to manage physical registers. Howeve...
A. Roth
CCR
2007
119views more  CCR 2007»
13 years 7 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
« Prev « First page 1837 / 1872 Last » Next »