Sciweavers

5544 search results - page 1101 / 1109
» Three Inadequate Models
Sort
View
BMCBI
2011
13 years 2 months ago
RAIphy: Phylogenetic classification of metagenomics samples using iterative refinement of relative abundance index profiles
Background: Computational analysis of metagenomes requires the taxonomical assignment of the genome contigs assembled from DNA reads of environmental samples. Because of the diver...
Ozkan U. Nalbantoglu, Samuel F. Way, Steven H. Hin...
BSL
2011
13 years 2 months ago
Combinatorial dichotomies in set theory
show that an abstract analysis of one of these three set theoretic principles can sometimes lead us to results that do not require additional axioms at all but which could have bee...
Stevo Todorcevic
CORR
2011
Springer
197views Education» more  CORR 2011»
13 years 2 months ago
High-Throughput Transaction Executions on Graphics Processors
OLTP (On-Line Transaction Processing) is an important business system sector in various traditional and emerging online services. Due to the increasing number of users, OLTP syste...
Bingsheng He, Jeffrey Xu Yu
CORR
2011
Springer
213views Education» more  CORR 2011»
13 years 2 months ago
Liquidsoap: a High-Level Programming Language for Multimedia Streaming
Generating multimedia streams, such as in a netradio, is a task which is complex and difficult to adapt to every users’ needs. We introduce a novel approach in order to achieve i...
David Baelde, Romain Beauxis, Samuel Mimram
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
« Prev « First page 1101 / 1109 Last » Next »