Sciweavers

1108 search results - page 209 / 222
» Making sense of sensemaking
Sort
View
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 8 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
MOBICOM
2010
ACM
13 years 7 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
SIGMETRICS
2010
ACM
217views Hardware» more  SIGMETRICS 2010»
13 years 7 months ago
Optimal recovery of single disk failure in RDP code storage systems
Modern storage systems use thousands of inexpensive disks to meet the storage requirement of applications. To enhance the data availability, some form of redundancy is used. For e...
Liping Xiang, Yinlong Xu, John C. S. Lui, Qian Cha...
BMCBI
2010
118views more  BMCBI 2010»
13 years 7 months ago
Towards realistic benchmarks for multiple alignments of non-coding sequences
Background: With the continued development of new computational tools for multiple sequence alignment, it is necessary today to develop benchmarks that aid the selection of the mo...
Jaebum Kim, Saurabh Sinha
BMCBI
2010
132views more  BMCBI 2010»
13 years 7 months ago
Consistency, comprehensiveness, and compatibility of pathway databases
Background: It is necessary to analyze microarray experiments together with biological information to make better biological inferences. We investigate the adequacy of current bio...
Donny Soh, Difeng Dong, Yike Guo, Limsoon Wong