Sciweavers

39 search results - page 8 / 8
» Leveraging COUNT Information in Sampling Hidden Databases
Sort
View
FAST
2010
13 years 7 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
FUZZIEEE
2007
IEEE
13 years 11 months ago
Decoding Trace Peak Behaviour - A Neuro-Fuzzy Approach
— DNA sequence basecalling is commonly regarded as a solved problem, despite significant error rates being reflected in inaccuracies in databases and genome annotations. This has...
David Thornley, Stavros Petridis
CIKM
2009
Springer
13 years 12 months ago
Post-rank reordering: resolving preference misalignments between search engines and end users
No search engine is perfect. A typical type of imperfection is the preference misalignment between search engines and end users, e.g., from time to time, web users skip higherrank...
Chao Liu, Mei Li, Yi-Min Wang
ASSETS
2006
ACM
13 years 11 months ago
American sign language recognition in game development for deaf children
CopyCat is an American Sign Language (ASL) game, which uses gesture recognition technology to help young deaf children practice ASL skills. We describe a brief history of the game...
Helene Brashear, Valerie L. Henderson, Kwang-Hyun ...