Sciweavers

1311 search results - page 235 / 263
» Kernel-based relation extraction from investigative data
Sort
View
158
Voted
JDFP
2006
139views more  JDFP 2006»
15 years 3 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
103
Voted
BMCBI
2010
91views more  BMCBI 2010»
15 years 2 months ago
Washing scaling of GeneChip microarray expression
Background: Post-hybridization washing is an essential part of microarray experiments. Both the quality of the experimental washing protocol and adequate consideration of washing ...
Hans Binder, Knut Krohn, Conrad J. Burden
145
Voted
SOCIALCOM
2010
15 years 1 months ago
Traffic in Social Media I: Paths Through Information Networks
Wikipedia is used every day by people all around the world, to satisfy a variety of information needs. We crosscorrelate multiple Wikipedia traffic data sets to infer various behav...
Jacob Ratkiewicz, Alessandro Flammini, Filippo Men...
161
Voted
CC
2006
Springer
125views System Software» more  CC 2006»
15 years 7 months ago
Path-Based Reuse Distance Analysis
Abstract. Profiling can effectively analyze program behavior and provide critical information for feedback-directed or dynamic optimizations. Based on memory profiling, reuse dista...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...
127
Voted
PROMISE
2010
14 years 10 months ago
Better, faster, and cheaper: what is better software?
Background: Defects are related to failures and they do not have much power for indicating a higher quality or a better system above the baseline that the end-users expect. Nevert...
Burak Turhan, Çetin Meriçli, Tekin M...