Sciweavers

2284 search results - page 66 / 457
» The new iris data: modular data generators
Sort
View
CHI
2008
ACM
14 years 11 days ago
Toped: enabling end-user programmers to validate data
Existing tools require end-user programmers (EUPs) to write regular expressions ("regexps") or even scripts to validate textual inputs, which is slow and error-prone. We...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
CONEXT
2007
ACM
14 years 5 days ago
Towards a clustering based data diffusion protocol in delay tolerant networks
In Delay Tolerant Networks (DTN), diffusion protocols can benefit from the users’ mobility in order to reach some distant nodes. However, existing protocols like flooding pres...
Sana Tmar, Eric Fleury
TNN
2008
129views more  TNN 2008»
13 years 10 months ago
Data Visualization and Dimensionality Reduction Using Kernel Maps With a Reference Point
In this paper, a new kernel-based method for data visualization and dimensionality reduction is proposed. A reference point is considered corresponding to additional constraints ta...
Johan A. K. Suykens
BMCBI
2007
146views more  BMCBI 2007»
13 years 10 months ago
Bayesian hierarchical model for transcriptional module discovery by jointly modeling gene expression and ChIP-chip data
Background: Transcriptional modules (TM) consist of groups of co-regulated genes and transcription factors (TF) regulating their expression. Two high-throughput (HT) experimental ...
Xiangdong Liu, Walter J. Jessen, Siva Sivaganesan,...
SECURWARE
2008
IEEE
14 years 4 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...