Sciweavers

5435 search results - page 1017 / 1087
» Informed Detection Revisited
Sort
View
TMC
2012
13 years 6 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
EDBT
2012
ACM
246views Database» more  EDBT 2012»
13 years 6 months ago
"Cut me some slack": latency-aware live migration for databases
Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. I...
Sean Kenneth Barker, Yun Chi, Hyun Jin Moon, Hakan...
BMCBI
2005
121views more  BMCBI 2005»
15 years 4 months ago
Comparison of seven methods for producing Affymetrix expression scores based on False Discovery Rates in disease profiling data
Background: A critical step in processing oligonucleotide microarray data is combining the information in multiple probes to produce a single number that best captures the express...
Kerby Shedden, Wei Chen, Rork Kuick, Debashis Ghos...
BMCBI
2005
143views more  BMCBI 2005»
15 years 4 months ago
Gene capture prediction and overlap estimation in EST sequencing from one or multiple libraries
Background: In expressed sequence tag (EST) sequencing, we are often interested in how many genes we can capture in an EST sample of a targeted size. This information provides ins...
Ji-Ping Z. Wang, Bruce G. Lindsay 0002, Liying Cui...
CVPR
2009
IEEE
16 years 11 months ago
Dictionary-Free Categorization of Very Similar Objects via Stacked Evidence Trees
Current work in object categorization discriminates among objects that typically possess gross differences which are readily apparent. However, many applications require making ...
Andrew Moldenke, Asako Yamamuro, David A. Lytle, E...
« Prev « First page 1017 / 1087 Last » Next »