Sciweavers

256 search results - page 39 / 52
» Approximation of the worst-case execution time using structu...
Sort
View
SIGOPS
2010
162views more  SIGOPS 2010»
14 years 10 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
CSSC
2008
77views more  CSSC 2008»
14 years 11 months ago
Undercoverage of Wavelet-Based Resampling Confidence Intervals
The decorrelating property of the discrete wavelet transformation (DWT) appears valuable because one can avoid estimating the correlation structure in the original data space by b...
Liansheng Tang, Wayne A. Woodward, William R. Schu...
CORR
2008
Springer
116views Education» more  CORR 2008»
14 years 11 months ago
An Evidential Path Logic for Multi-Relational Networks
Multi-relational networks are used extensively to structure knowledge. Perhaps the most popular instance, due to the widespread adoption of the Semantic Web, is the Resource Descr...
Marko A. Rodriguez, Joe Geldart
BMCBI
2010
175views more  BMCBI 2010»
14 years 11 months ago
Calibur: a tool for clustering large numbers of protein decoys
Background: Ab initio protein structure prediction methods generate numerous structural candidates, which are referred to as decoys. The decoy with the most number of neighbors of...
Shuai Cheng Li, Yen Kaow Ng
SOICT
2010
14 years 6 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...