Sciweavers

740 search results - page 121 / 148
» An approximation ratio for biclustering
Sort
View
RECONFIG
2009
IEEE
182views VLSI» more  RECONFIG 2009»
15 years 6 months ago
Scalability Studies of the BLASTn Scan and Ungapped Extension Functions
BLASTn is a ubiquitous tool used for large scale DNA analysis. Detailed profiling tests reveal that the most computationally intensive sections of the BLASTn algorithm are the sc...
Siddhartha Datta, Ron Sass
APPROX
2009
Springer
163views Algorithms» more  APPROX 2009»
15 years 6 months ago
The Power of Preemption on Unrelated Machines and Applications to Scheduling Orders
Abstract. Scheduling jobs on unrelated parallel machines so as to minimize the makespan is one of the basic, well-studied problems in the area of machine scheduling. In the first ...
José R. Correa, Martin Skutella, José...
ESA
2009
Springer
127views Algorithms» more  ESA 2009»
15 years 6 months ago
Piercing Translates and Homothets of a Convex Body
According to a classical result of Gr¨unbaum, the transversal number τ(F) of any family F of pairwise-intersecting translates or homothets of a convex body C in Rd is bounded by...
Adrian Dumitrescu, Minghui Jiang
GLOBECOM
2008
IEEE
15 years 6 months ago
Performance Analysis of Free-Space Optical Systems in Gamma-Gamma Fading
— Atmospheric turbulence induced fading is one of the main impairments affecting free–space optics (FSO). In recent years, Gamma–Gamma fading has become the dominant fading m...
Ehsan Bayaki, Robert Schober, Ranjan K. Mallik
GLOBECOM
2008
IEEE
15 years 6 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar