Sciweavers

2169 search results - page 426 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
BMCBI
2008
117views more  BMCBI 2008»
13 years 7 months ago
RNACompress: Grammar-based compression and informational complexity measurement of RNA secondary structure
Background: With the rapid emergence of RNA databases and newly identified non-coding RNAs, an efficient compression algorithm for RNA sequence and structural information is neede...
Qi Liu, Yu Yang, Chun Chen, Jiajun Bu, Yin Zhang, ...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 7 months ago
Architecture for Cooperative Prefetching in P2P Video-on- Demand System
Most P2P VoD schemes focused on service architectures and overlays optimization without considering segments rarity and the performance of prefetching strategies. As a result, the...
Ubaid Abbasi, Toufik Ahmed
TON
2008
136views more  TON 2008»
13 years 7 months ago
A geometric approach to improving active packet loss measurement
Abstract-- Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. Whi...
Joel Sommers, Paul Barford, Nick G. Duffield, Amos...
IOR
2010
169views more  IOR 2010»
13 years 6 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic
TIFS
2010
173views more  TIFS 2010»
13 years 5 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain