Sciweavers

7264 search results - page 1445 / 1453
» A multiplicative up-propagation algorithm
Sort
View
CCR
2006
76views more  CCR 2006»
14 years 9 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
CN
2006
62views more  CN 2006»
14 years 9 months ago
Key bundles and parcels: Secure communication in many groups
We consider a system where each user is in one or more elementary groups. In this system, arbitrary groups of users can be specified using the operations of union, intersection, a...
Eunjin Jung, Alex X. Liu, Mohamed G. Gouda
COMCOM
2006
121views more  COMCOM 2006»
14 years 9 months ago
Load-balanced agent activation for value-added network services
In relation to its growth in size and user population, the Internet faces new challenges that have triggered the proposals of value-added network services, e.g., IP multicast, IP ...
Chao Gong, Kamil Saraç, Ovidiu Daescu, Bala...
BMCBI
2007
160views more  BMCBI 2007»
14 years 9 months ago
Establishing a major cause of discrepancy in the calibration of Affymetrix GeneChips
Background: Affymetrix GeneChips are a popular platform for performing whole-genome experiments on the transcriptome. There are a range of different calibration steps, and users a...
Andrew P. Harrison, Caroline E. Johnston, Christin...
BMCBI
2007
166views more  BMCBI 2007»
14 years 9 months ago
How to decide which are the most pertinent overly-represented features during gene set enrichment analysis
Background: The search for enriched features has become widely used to characterize a set of genes or proteins. A key aspect of this technique is its ability to identify correlati...
Roland Barriot, David J. Sherman, Isabelle Dutour
« Prev « First page 1445 / 1453 Last » Next »