Sciweavers

2421 search results - page 464 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
TACAS
2005
Springer
108views Algorithms» more  TACAS 2005»
14 years 2 months ago
On Some Transformation Invariants Under Retiming and Resynthesis
Transformations using retiming and resynthesis operations are the most important and practical (if not the only) techniques used in optimizing synchronous hardware systems. Althoug...
Jie-Hong Roland Jiang
OSDI
1994
ACM
13 years 10 months ago
Performance Issues in Parallelized Network Protocols
Parallel processing has been proposed as a means of improving network protocol throughput. Several different strategies have been taken towards parallelizing protocols. A relative...
Erich M. Nahum, David J. Yates, James F. Kurose, D...
BMCBI
2007
97views more  BMCBI 2007»
13 years 8 months ago
SIRAC: Supervised Identification of Regions of Aberration in aCGH datasets
Background: Array comparative genome hybridization (aCGH) provides information about genomic aberrations. Alterations in the DNA copy number may cause the cell to malfunction, lea...
Carmen Lai, Hugo M. Horlings, Marc J. van de Vijve...
ICWSM
2009
13 years 6 months ago
Targeting Sentiment Expressions through Supervised Ranking of Linguistic Configurations
User generated content is extremely valuable for mining market intelligence because it is unsolicited. We study the problem of analyzing users' sentiment and opinion in their...
Jason S. Kessler, Nicolas Nicolov
CORR
2011
Springer
183views Education» more  CORR 2011»
13 years 3 months ago
Automatic Network Fingerprinting through Single-Node Motifs
Complex networks have been characterised by their specific connectivity patterns (network motifs), but their building blocks can also be identified and described by node-motifs—...
Christoph Echtermeyer, Luciano da Fontoura Costa, ...