Sciweavers

373 search results - page 53 / 75
» Identifying graphs from noisy and incomplete data
Sort
View
DASC
2006
IEEE
13 years 11 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
BMCBI
2006
157views more  BMCBI 2006»
13 years 7 months ago
Comparison of protein interaction networks reveals species conservation and divergence
Background: Recent progresses in high-throughput proteomics have provided us with a first chance to characterize protein interaction networks (PINs), but also raised new challenge...
Zhi Liang, Meng Xu, Maikun Teng, Liwen Niu
CPE
1994
Springer
170views Hardware» more  CPE 1994»
13 years 11 months ago
Automatic Scalability Analysis of Parallel Programs Based on Modeling Techniques
When implementingparallel programs forparallel computer systems the performancescalability of these programs should be tested and analyzed on different computer configurations and...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...
WWW
2008
ACM
14 years 8 months ago
Characterizing typical and atypical user sessions in clickstreams
Millions of users retrieve information from the Internet using search engines. Mining these user sessions can provide valuable information about the quality of user experience and...
Narayanan Sadagopan, Jie Li
CIBCB
2006
IEEE
14 years 1 months ago
Motif Evaluation by Leave-one-out Scoring
Abstract— We propose a new method for collecting information on regulatory elements found by any motif discovery program. We suggest that combining the results of n leave-oneout ...
Audrey Girouard, Noah W. Smith, Donna K. Slonim