Sciweavers

117 search results - page 23 / 24
» Analysis of Long Branch Extraction
Sort
View
COCO
2009
Springer
155views Algorithms» more  COCO 2009»
13 years 11 months ago
Weak Derandomization of Weak Algorithms: Explicit Versions of Yao's Lemma
—A simple averaging argument shows that given a randomized algorithm A and a function f such that for every input x, Pr[A(x) = f(x)] ≥ 1−ρ (where the probability is over the...
Ronen Shaltiel
BMCBI
2007
239views more  BMCBI 2007»
13 years 4 months ago
Pre-processing Agilent microarray data
Background: Pre-processing methods for two-sample long oligonucleotide arrays, specifically the Agilent technology, have not been extensively studied. The goal of this study is to...
Marianna Zahurak, Giovanni Parmigiani, Wayne Yu, R...
INFOCOM
2011
IEEE
12 years 8 months ago
Describing and forecasting video access patterns
Abstract—Computer systems are increasingly driven by workloads that reflect large-scale social behavior, such as rapid changes in the popularity of media items like videos. Capa...
Gonca Gürsun, Mark Crovella, Ibrahim Matta
JCDL
2011
ACM
260views Education» more  JCDL 2011»
12 years 7 months ago
Extending digital repository architectures to support disk image preservation and access
Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support da...
Kam Woods, Christopher A. Lee, Simson Garfinkel
16
Voted
IMC
2003
ACM
13 years 10 months ago
Constructing internet coordinate system based on delay measurement
In this paper, we consider the problem of how to represent the locations of Internet hosts in a Cartesian coordinate system to facilitate estimate of the network distance between ...
Hyuk Lim, Jennifer C. Hou, Chong-Ho Choi