Sciweavers

641 search results - page 11 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
TITB
2008
124views more  TITB 2008»
13 years 7 months ago
Miniature in vivo Robots for Remote and Harsh Environments
Abstract--Long-term human space exploration will require contingencies for emergency medical procedures including some capability to perform surgery. The ability to perform minimal...
Mark Rentschler, Stephen R. Platt, Kyle R. Berg, J...
BMCBI
2010
214views more  BMCBI 2010»
13 years 7 months ago
AutoSOME: a clustering method for identifying gene expression modules without prior knowledge of cluster number
Background: Clustering the information content of large high-dimensional gene expression datasets has widespread application in "omics" biology. Unfortunately, the under...
Aaron M. Newman, James B. Cooper
ACSAC
2002
IEEE
14 years 14 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
PVLDB
2010
139views more  PVLDB 2010»
13 years 2 months ago
Identifying the Most Influential Data Objects with Reverse Top-k Queries
Top-k queries are widely applied for retrieving a ranked set of the k most interesting objects based on the individual user preferences. As an example, in online marketplaces, cus...
Akrivi Vlachou, Christos Doulkeridis, Kjetil N&osl...
INFOCOM
2009
IEEE
14 years 2 months ago
Identifying High Cardinality Internet Hosts
—The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some examp...
Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhan...