Sciweavers

1266 search results - page 200 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
BMCBI
2008
146views more  BMCBI 2008»
13 years 8 months ago
Rank-based edge reconstruction for scale-free genetic regulatory networks
Background: The reconstruction of genetic regulatory networks from microarray gene expression data has been a challenging task in bioinformatics. Various approaches to this proble...
Guanrao Chen, Peter Larsen, Eyad Almasri, Yang Dai
BMCBI
2007
157views more  BMCBI 2007»
13 years 8 months ago
Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory
Background: Large-scale sequencing of entire genomes has ushered in a new age in biology. One of the next grand challenges is to dissect the cellular networks consisting of many i...
Feng Luo, Yunfeng Yang, Jianxin Zhong, Haichun Gao...
FGCS
2006
111views more  FGCS 2006»
13 years 8 months ago
Collaborative data visualization for Earth Sciences with the OptIPuter
Collaborative visualization of large-scale datasets across geographically distributed sites is becoming increasingly important for Earth Sciences. Not only does it enhance our und...
Nut Taesombut, Xinran (Ryan) Wu, Andrew A. Chien, ...
SIGMETRICS
2008
ACM
138views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Utility maximization in peer-to-peer systems
In this paper, we study the problem of utility maximization in P2P systems, in which aggregate application-specific utilities are maximized by running distributed algorithms on P2...
Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Ji...
AINA
2007
IEEE
14 years 2 months ago
Data Stream Based Algorithms For Wireless Sensor Network Applications
Abstract— A wireless sensor network (WSN) is energy constrained, and the extension of its lifetime is one of the most important issues in its design. Usually, a WSN collects a la...
André L. L. de Aquino, Carlos Mauricio S. F...