Sciweavers

2421 search results - page 456 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
DMIN
2006
126views Data Mining» more  DMIN 2006»
13 years 11 months ago
Comparison and Analysis of Mutation-based Evolutionary Algorithms for ANN Parameters Optimization
Mutation-based Evolutionary Algorithms, also known as Evolutionary Programming (EP) are commonly applied to Artificial Neural Networks (ANN) parameters optimization. This paper pre...
Kristina Davoian, Alexander Reichel, Wolfram-Manfr...
JMS
2007
117views more  JMS 2007»
13 years 9 months ago
Closing Emergency Operating Rooms Improves Efficiency
Long waiting times for emergency operations increase a patient’s risk of postoperative complications and morbidity. Reserving Operating Room (OR) capacity is a common technique t...
Gerhard Wullink, Mark van Houdenhoven, Erwin W. Ha...
NETWORK
2007
167views more  NETWORK 2007»
13 years 9 months ago
Sensor Localization under Limited Measurement Capabilities
If we abstract a sensor network as a network graph consisting of vertices and edges, where vertices represent sensor nodes and edges represent distance measurements between neighbo...
Chen Wang, Li Xiao
CANDT
2009
14 years 1 months ago
The conference room as a toolbox: technological and social routines in corporate meeting spaces
HCI, CSCW, and ubicomp researchers have developed new technologies and interaction techniques to support collaboration, ranging from electronic whiteboards to software supporting ...
Christopher Plaue, John T. Stasko, Mark Baloga
BMCBI
2010
115views more  BMCBI 2010»
13 years 10 months ago
Importance of replication in analyzing time-series gene expression data: Corticosteroid dynamics and circadian patterns in rat l
Background: Microarray technology is a powerful and widely accepted experimental technique in molecular biology that allows studying genome wide transcriptional responses. However...
Tung T. Nguyen, Richard R. Almon, Debra C. DuBois,...