Sciweavers

715 search results - page 113 / 143
» Second step algorithms in the Burrows-Wheeler compression al...
Sort
View
IPPS
2008
IEEE
14 years 1 months ago
PROD: Relayed file retrieving in overlay networks
— To share and exchange the files among Internet users, Peerto-Peer (P2P) applications build another layer of overlay networks on top of the Internet Infrastructure. In P2P fil...
Zhiyong Xu, D. Stefanescu, Honggang Zhang, Laxmi N...
AIRWEB
2005
Springer
14 years 1 months ago
Web Spam, Propaganda and Trust
Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. ...
Panagiotis Takis Metaxas, Joseph DeStefano
ESANN
2008
13 years 9 months ago
A method for robust variable selection with significance assessment
Our goal is proposing an unbiased framework for gene expression analysis based on variable selection combined with a significance assessment step. We start by discussing the need ...
Annalisa Barla, Sofia Mosci, Lorenzo Rosasco, Ales...
BMCBI
2010
151views more  BMCBI 2010»
13 years 7 months ago
Misty Mountain clustering: application to fast unsupervised flow cytometry gating
Background: There are many important clustering questions in computational biology for which no satisfactory method exists. Automated clustering algorithms, when applied to large,...
István P. Sugár, Stuart C. Sealfon
VIS
2008
IEEE
175views Visualization» more  VIS 2008»
14 years 8 months ago
Generation of Accurate Integral Surfaces in Time-Dependent Vector Fields
We present a novel approach for the direct computation of integral surfaces in general vector fields. As opposed to previous work, which we analyze in detail, our approach is based...
Christoph Garth, Hari Krishnan, Xavier Tricoche,...