Sciweavers

1403 search results - page 273 / 281
» Set cover algorithms for very large datasets
Sort
View
BMCBI
2011
13 years 3 months ago
Removing Noise From Pyrosequenced Amplicons
Background: In many environmental genomics applications a homologous region of DNA from a diverse sample is first amplified by PCR and then sequenced. The next generation sequenci...
Christopher Quince, Anders Lanzén, Russell ...
CODES
2003
IEEE
14 years 1 months ago
A multiobjective optimization model for exploring multiprocessor mappings of process networks
In the Sesame framework, we develop a modeling and simulation environment for the efficient design space exploration of heterogeneous embedded systems. Since Sesame recognizes se...
Cagkan Erbas, Selin C. Erbas, Andy D. Pimentel
BMCBI
2006
129views more  BMCBI 2006»
13 years 8 months ago
Independent Component Analysis-motivated Approach to Classificatory Decomposition of Cortical Evoked Potentials
Background: Independent Component Analysis (ICA) proves to be useful in the analysis of neural activity, as it allows for identification of distinct sources of activity. Applied t...
Tomasz G. Smolinski, Roger Buchanan, Grzegorz M. B...
CIKM
2011
Springer
12 years 8 months ago
Lower-bounding term frequency normalization
In this paper, we reveal a common deficiency of the current retrieval models: the component of term frequency (TF) normalization by document length is not lower-bounded properly;...
Yuanhua Lv, ChengXiang Zhai
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 9 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...