Sciweavers

5829 search results - page 1092 / 1166
» The Practice of Cluster Analysis
Sort
View
CIKM
2011
Springer
12 years 9 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
BMCBI
2002
89views more  BMCBI 2002»
13 years 8 months ago
Sources of variability and effect of experimental approach on expression profiling data interpretation
Background: We provide a systematic study of the sources of variability in expression profiling data using 56 RNAs isolated from human muscle biopsies (34 Affymetrix MuscleChip ar...
Marina Bakay, Yi-Wen Chen, Rehannah H. A. Borup, P...
SPAA
2009
ACM
14 years 9 months ago
Dynamic external hashing: the limit of buffering
Hash tables are one of the most fundamental data structures in computer science, in both theory and practice. They are especially useful in external memory, where their query perf...
Zhewei Wei, Ke Yi, Qin Zhang
ACMSE
2008
ACM
13 years 11 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
ECCV
2000
Springer
14 years 10 months ago
Model-Based Initialisation for Segmentation
The initialisation of segmentation methods aiming at the localisation of biological structures in medical imagery is frequently regarded as a given precondition. In practice, howev...
Christian Brechbühler, Gábor Szé...
« Prev « First page 1092 / 1166 Last » Next »