Sciweavers

861 search results - page 111 / 173
» Predicting Attack-prone Components
Sort
View
ICAC
2006
IEEE
14 years 4 months ago
QMON: QoS- and Utility-Aware Monitoring in Enterprise Systems
Abstract— The scale, reliability, and cost requirements of enterprise data centers require automation of center management. Examples include provisioning, scheduling, capacity pl...
Sandip Agarwala, Yuan Chen, Dejan S. Milojicic, Ka...
BMCBI
2002
76views more  BMCBI 2002»
13 years 10 months ago
The SGS3 protein involved in PTGS finds a family
Background: Post transcriptional gene silencing (PTGS) is a recently discovered phenomenon that is an area of intense research interest. Components of the PTGS machinery are being...
Alex Bateman
CHI
2008
ACM
14 years 10 months ago
PeerChooser: visual interactive recommendation
Collaborative filtering (CF) has been successfully deployed over the years to compute predictions on items based on a user's correlation with a set of peers. The black-box na...
Barry Smyth, Brynjar Gretarsson, John O'Donovan, S...
RECOMB
2004
Springer
14 years 10 months ago
Modeling and Analysis of Heterogeneous Regulation in Biological Networks
Abstract. In this study we propose a novel model for the representation of biological networks and provide algorithms for learning model parameters from experimental data. Our appr...
Irit Gat-Viks, Amos Tanay, Ron Shamir
VRST
2009
ACM
14 years 4 months ago
Gaze behavior and visual attention model when turning in virtual environments
In this paper we analyze and try to predict the gaze behavior of users navigating in virtual environments. We focus on first-person navigation in virtual environments which invol...
Sébastien Hillaire, Anatole Lécuyer,...