Sciweavers

30 search results - page 6 / 6
» Using Multiple Combined Ranker for Answering Definitional Qu...
Sort
View
KDD
2002
ACM
166views Data Mining» more  KDD 2002»
14 years 5 months ago
Exploiting response models: optimizing cross-sell and up-sell opportunities in banking
The banking industry regularly mounts campaigns to improve customer value by offering new products to existing customers. In recent years this approach has gained significant mome...
Andrew Storey, Marc-David Cohen
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 2 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
INFOCOM
2012
IEEE
11 years 7 months ago
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance
—There is a growing interest in exploiting interference (rather than avoiding it) to increase network throughput. In particular, the so-called successive interference cancellatio...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
BMCBI
2005
113views more  BMCBI 2005»
13 years 4 months ago
Systematic survey reveals general applicability of "guilt-by-association" within gene coexpression networks
Background: Biological processes are carried out by coordinated modules of interacting molecules. As clustering methods demonstrate that genes with similar expression display incr...
Cecily J. Wolfe, Isaac S. Kohane, Atul J. Butte
INFOVIS
2005
IEEE
13 years 10 months ago
The Visual Code Navigator: An Interactive Toolset for Source Code Investigation
We present the Visual Code Navigator, a set of three interrelated visual tools that we developed for exploring large source code software projects from three different perspective...
Gerard Lommerse, Freek Nossin, Lucian Voinea, Alex...