Sciweavers

2169 search results - page 345 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
WSC
2000
15 years 5 months ago
Analyzing transformation-based simulation metamodels
We present a technique for analyzing a simulation metamodel that has been constructed using a variancestabilizing transformation. To compute a valid confidence interval for the ex...
Maria de los A. Irizarry, Michael E. Kuhl, Emily K...
SIGMOD
2008
ACM
161views Database» more  SIGMOD 2008»
16 years 4 months ago
Efficient pattern matching over event streams
Pattern matching over event streams is increasingly being employed in many areas including financial services, RFIDbased inventory management, click stream analysis, and electroni...
Jagrati Agrawal, Yanlei Diao, Daniel Gyllstrom, Ne...
115
Voted
BMCBI
2006
86views more  BMCBI 2006»
15 years 4 months ago
The impact of sample imbalance on identifying differentially expressed genes
Background: Recently several statistical methods have been proposed to identify genes with differential expression between two conditions. However, very few studies consider the p...
Kun Yang, Jianzhong Li, Hong Gao
CCS
2004
ACM
15 years 10 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
CIKM
2004
Springer
15 years 10 months ago
RStar: an RDF storage and query system for enterprise resource management
Modern corporations operate in an extremely complex environment and strongly depend on all kinds of information resources across the enterprise. Unfortunately, with the growth of ...
Li Ma, Zhong Su, Yue Pan, Li Zhang, Tao Liu