Sciweavers

771 search results - page 149 / 155
» Access Methods and Query Processing Techniques
Sort
View
BMCBI
2005
99views more  BMCBI 2005»
15 years 16 days ago
CGH-Profiler: Data mining based on genomic aberration profiles
Background: CGH-Profiler is a program that supports the analysis of genomic aberrations measured by Comparative Genomic Hybridisation (CGH). Comparative genomic hybridisation (CGH...
Falk Schubert, Bernhard Tausch, Stefan Joos, Rolan...
121
Voted
NETGAMES
2005
ACM
15 years 6 months ago
Dissecting server-discovery traffic patterns generated by multiplayer first person shooter games
We study the ‘background traffic’ resulting from tens of thousands of networked first person shooter (FPS) clients searching for servers on which to play. Networked, multiplay...
Sebastian Zander, David Kennedy, Grenville J. Armi...
98
Voted
BMCBI
2010
91views more  BMCBI 2010»
15 years 22 days ago
Ranked retrieval of Computational Biology models
Background: The study of biological systems demands computational support. If targeting a biological problem, the reuse of existing computational models can save time and effort. ...
Ron Henkel, Lukas Endler, Andre Peters, Nicolas Le...
108
Voted
JAMIA
2011
98views more  JAMIA 2011»
14 years 3 months ago
Mapping clinical phenotype data elements to standardized metadata repositories and controlled terminologies: the eMERGE Network
Background Systematic study of clinical phenotypes is important for a better understanding of the genetic basis of human diseases and more effective gene-based disease management....
Jyotishman Pathak, Janey Wang, Sudha Kashyap, Meli...
147
Voted
SIGIR
2012
ACM
13 years 3 months ago
Search, interrupted: understanding and predicting search task continuation
Many important search tasks require multiple search sessions to complete. Tasks such as travel planning, large purchases, or job searches can span hours, days, or even weeks. Inev...
Eugene Agichtein, Ryen W. White, Susan T. Dumais, ...