Sciweavers

1039 search results - page 203 / 208
» Methods as knowledge enablers in software development organi...
Sort
View
BMCBI
2011
12 years 11 months ago
Linear and non-linear dependencies between copy number aberrations and mRNA expression reveal distinct molecular pathways in Bre
Background: Elucidating the exact relationship between gene copy number and expression would enable identification of regulatory mechanisms of abnormal gene expression and biologi...
Hiroko K. Solvang, Ole Christian Lingjærde, ...
ICDE
2012
IEEE
203views Database» more  ICDE 2012»
11 years 9 months ago
Parameter-Free Determination of Distance Thresholds for Metric Distance Constraints
—The importance of introducing distance constraints to data dependencies, such as differential dependencies (DDs) [28], has recently been recognized. The metric distance constrai...
Shaoxu Song, Lei Chen 0002, Hong Cheng
KDD
2006
ACM
174views Data Mining» more  KDD 2006»
14 years 7 months ago
Onboard classifiers for science event detection on a remote sensing spacecraft
Typically, data collected by a spacecraft is downlinked to Earth and pre-processed before any analysis is performed. We have developed classifiers that can be used onboard a space...
Ashley Davies, Benjamin Cichy, Dominic Mazzoni, Ng...
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
14 years 7 months ago
On-board analysis of uncalibrated data for a spacecraft at mars
Analyzing data on-board a spacecraft as it is collected enables several advanced spacecraft capabilities, such as prioritizing observations to make the best use of limited bandwid...
Benyang Tang, Kiri Wagstaff, Rebecca Castañ...
LCTRTS
2010
Springer
14 years 5 days ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul