Sciweavers

110 search results - page 21 / 22
» General Software Competency: Is There Still a Need for Softw...
Sort
View
BMCBI
2010
102views more  BMCBI 2010»
13 years 5 months ago
Identification of recurrent regions of copy-number variants across multiple individuals
Background: Algorithms and software for CNV detection have been developed, but they detect the CNV regions sample-by-sample with individual-specific breakpoints, while common CNV ...
Teo Shu Mei, Agus Salim, Stefano Calza, Ku Chee Se...
SENSYS
2009
ACM
14 years 1 days ago
Macrodebugging: global views of distributed program execution
Creating and debugging programs for wireless embedded networks (WENs) is notoriously difficult. Macroprogramming is an emerging technology that aims to address this by providing ...
Tamim I. Sookoor, Timothy W. Hnat, Pieter Hooimeij...
SYSTOR
2009
ACM
13 years 11 months ago
The effectiveness of deduplication on virtual machine disk images
Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. While th...
Keren Jin, Ethan L. Miller
SOUPS
2005
ACM
13 years 10 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
KDD
2009
ACM
248views Data Mining» more  KDD 2009»
13 years 9 months ago
PSkip: estimating relevance ranking quality from web search clickthrough data
1 In this article, we report our efforts in mining the information encoded as clickthrough data in the server logs to evaluate and monitor the relevance ranking quality of a commer...
Kuansan Wang, Toby Walker, Zijian Zheng