Sciweavers

144 search results - page 23 / 29
» Application-Level Isolation Using Data Inconsistency Detecti...
Sort
View
ISMB
1997
15 years 1 months ago
A Fast Heuristic Algorithm for a Probe Mapping Problem
Anewheuristic algorithm is presented for mapping probes to locations along the genome,given noisy pairwise distance data as input. Themodel consideredis quite general: Theinput co...
Brendan Mumey
111
Voted
ENTCS
2007
113views more  ENTCS 2007»
14 years 11 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 10 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
BMCBI
2002
89views more  BMCBI 2002»
14 years 11 months ago
Sources of variability and effect of experimental approach on expression profiling data interpretation
Background: We provide a systematic study of the sources of variability in expression profiling data using 56 RNAs isolated from human muscle biopsies (34 Affymetrix MuscleChip ar...
Marina Bakay, Yi-Wen Chen, Rehannah H. A. Borup, P...
101
Voted
TDSC
2010
146views more  TDSC 2010»
14 years 6 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...