Sciweavers

7741 search results - page 1534 / 1549
» Security in Active Networks
Sort
View
TON
2010
167views more  TON 2010»
13 years 2 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
TSMC
2010
13 years 2 months ago
Optimizing Discounted Cash Flows in Project Scheduling - An Ant Colony Optimization Approach
Abstract--The multimode resource-constrained projectscheduling problem with discounted cash flows (MRCPSPDCF) is important and challenging for project management. As the problem is...
Wei-neng Chen, Jun Zhang, Henry Shu-Hung Chung, Ru...
BMCBI
2011
12 years 11 months ago
RegNetB: Predicting Relevant Regulator-Gene Relationships in Localized Prostate Tumor Samples
Background: A central question in cancer biology is what changes cause a healthy cell to form a tumor. Gene expression data could provide insight into this question, but it is dif...
Angel Alvarez, Peter J. Woolf
JOCN
2011
133views more  JOCN 2011»
12 years 10 months ago
A Candidate for the Attentional Bottleneck: Set-size Specific Modulation of the Right TPJ during Attentive Enumeration
■ Several recent behavioral studies have shown that the enumeration of a small number of items (a process termed subitizing) depends on the availability of attentional resources...
Petra Vetter, Brian Butterworth, Bahador Bahrami
PODS
2012
ACM
297views Database» more  PODS 2012»
11 years 10 months ago
Query-based data pricing
Data is increasingly being bought and sold online, and Webbased marketplace services have emerged to facilitate these activities. However, current mechanisms for pricing data are ...
Paraschos Koutris, Prasang Upadhyaya, Magdalena Ba...
« Prev « First page 1534 / 1549 Last » Next »