Sciweavers

36 search results - page 3 / 8
» Guidelines for Appropriate Use of Simulated Data for Bio-Aut...
Sort
View
COMCOM
2006
134views more  COMCOM 2006»
13 years 7 months ago
On the deployment of VoIP in Ethernet networks: methodology and case study
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step method...
Khaled Salah
SIGKDD
2002
232views more  SIGKDD 2002»
13 years 7 months ago
The True Lift Model - A Novel Data Mining Approach to Response Modeling in Database Marketing
In database marketing, data mining has been used extensively to find the optimal customer targets so as to maximize return on investment. In particular, using marketing campaign d...
Victor S. Y. Lo
PAMI
2007
121views more  PAMI 2007»
13 years 7 months ago
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
Sébastien Marcel, José del R. Mill&a...
BMCBI
2011
12 years 11 months ago
A fast and accurate method to detect allelic genomic imbalances underlying mosaic rearrangements using SNP array data
Background: Mosaicism for copy number and copy neutral chromosomal rearrangements has been recently identified as a relatively common source of genetic variation in the normal pop...
Juan R. González, Benjamin Rodriguez-Santia...
DILS
2004
Springer
13 years 11 months ago
An Ontology-Driven Framework for Data Transformation in Scientific Workflows
Abstract. Ecologists spend considerable effort integrating heterogeneous data for statistical analyses and simulations, for example, to run and test predictive models. Our research...
Shawn Bowers, Bertram Ludäscher