Sciweavers

4067 search results - page 696 / 814
» Programs for Applying Symmetries
Sort
View
KBS
2007
101views more  KBS 2007»
13 years 9 months ago
A Knowledge Base for the maintenance of knowledge extracted from web data
By applying web mining tools, significant patterns about the visitor behavior can be extracted from data originated in web sites. Supported by a domain expert, the patterns are v...
Juan D. Velásquez, Vasile Palade
MAGS
2007
82views more  MAGS 2007»
13 years 9 months ago
File transfer in Grid applications at deployment, execution and retrieval
In this article a three staged file transfer approach for the Grid is proposed. File transfer in the Grid can take place at three stages: deployment, user application execution, ...
Françoise Baude, Denis Caromel, Mario Leyto...
ASC
2004
13 years 9 months ago
Evaluation of services using a fuzzy analytic hierarchy process
This paper proposes a new approach for tackling the uncertainty and imprecision of the service evaluation process. Identifying suitable service offers, evaluating the offers and c...
Ludmil Mikhailov, Petco E. Tsvetinov
BIOINFORMATICS
2004
86views more  BIOINFORMATICS 2004»
13 years 9 months ago
Transposable element annotation of the rice genome
Motivation: The high content of repetitive sequences in the genomes of many higher eukaryotes renders the task of annotating them computationally intensive. Presently, the only wi...
Nikoleta Juretic, Thomas E. Bureau, Richard M. Bru...
CCR
2004
151views more  CCR 2004»
13 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster