Sciweavers

235 search results - page 46 / 47
» On Challenges in Evaluating Malware Clustering
Sort
View
BMCBI
2010
70views more  BMCBI 2010»
13 years 5 months ago
The Text-mining based PubChem Bioassay neighboring analysis
Background: In recent years, the number of High Throughput Screening (HTS) assays deposited in PubChem has grown quickly. As a result, the volume of both the structured informatio...
Lianyi Han, Tugba O. Suzek, Yanli Wang, Steve H. B...
BMCBI
2006
374views more  BMCBI 2006»
13 years 5 months ago
AMDA: an R package for the automated microarray data analysis
Background: Microarrays are routinely used to assess mRNA transcript levels on a genome-wide scale. Large amount of microarray datasets are now available in several databases, and...
Mattia Pelizzola, Norman Pavelka, Maria Foti, Paol...
BMCBI
2006
127views more  BMCBI 2006»
13 years 5 months ago
Construction of phylogenetic trees by kernel-based comparative analysis of metabolic networks
Background: To infer the tree of life requires knowledge of the common characteristics of each species descended from a common ancestor as the measuring criteria and a method to c...
Sok June Oh, Je-Gun Joung, Jeong Ho Chang, Byoung-...
JSAC
2007
97views more  JSAC 2007»
13 years 5 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
TC
2010
13 years 3 months ago
PERFECTORY: A Fault-Tolerant Directory Memory Architecture
—The number of CPUs in chip multiprocessors is growing at the Moore’s Law rate, due to continued technology advances. However, new technologies pose serious reliability challen...
Hyunjin Lee, Sangyeun Cho, Bruce R. Childers