Sciweavers

2028 search results - page 404 / 406
» Highly Predictive Blacklisting
Sort
View
WWW
2011
ACM
13 years 2 months ago
Finding the bias and prestige of nodes in networks based on trust scores
Many real-life graphs such as social networks and peer-topeer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such ...
Abhinav Mishra, Arnab Bhattacharya
TON
2010
93views more  TON 2010»
13 years 2 months ago
On the Validity of IEEE 802.11 MAC Modeling Hypotheses
We identify common hypotheses on which a large number of distinct mathematical models of WLANs employing IEEE 802.11 are founded. Using data from an experimental test bed and packe...
K. D. Huang, Ken R. Duffy, David Malone
WH
2010
208views Healthcare» more  WH 2010»
13 years 2 months ago
Portable, non-invasive fall risk assessment in end stage renal disease patients on hemodialysis
Patients with end stage renal diseases (ESRD) on hemodialysis (HD) have high morbidity and mortality due to multiple causes, one of which is dramatically higher fall rates than th...
Thurmon E. Lockhart, Adam T. Barth, Xiaoyue Zhang,...
ASPDAC
2011
ACM
167views Hardware» more  ASPDAC 2011»
12 years 11 months ago
Variation-tolerant and self-repair design methodology for low temperature polycrystalline silicon liquid crystal and organic lig
- In low temperature polycrystalline silicon (LTPS) based display technologies, the electrical parameter variations in thin film transistors (TFTs) caused by random grain boundarie...
Chih-Hsiang Ho, Chao Lu, Debabrata Mohapatra, Kaus...
BMCBI
2011
12 years 11 months ago
Detection of recurrent rearrangement breakpoints from copy number data
Background: Copy number variants (CNVs), including deletions, amplifications, and other rearrangements, are common in human and cancer genomes. Copy number data from array compara...
Anna M. Ritz, Pamela L. Paris, Michael Ittmann, Co...