Sciweavers

2229 search results - page 55 / 446
» Comparative analysis of biclustering algorithms
Sort
View
JCIT
2010
126views more  JCIT 2010»
14 years 6 months ago
An Improved DV-Hop Localization Algorithm based on The Selection of Beacon Nodes
In the trilateration of wireless sensor networks, to overcome the affection of localization error caused by the selection of beacon nodes, a selective strategy of beacon nodes bas...
Wen-yuan Liu, En-shuang Wang, Zi-jun Chen, Lin Wan...
SIGMETRICS
2002
ACM
106views Hardware» more  SIGMETRICS 2002»
14 years 11 months ago
Analysis of methods for scheduling low priority disk drive tasks
This paper analyzes various algorithms for scheduling low priority disk drive tasks. The derived closed form solution is applicable to class of greedy algorithms that include a va...
Eitan Bachmat, Jiri Schindler
ETRA
2000
ACM
199views Biometrics» more  ETRA 2000»
15 years 3 months ago
Identifying fixations and saccades in eye-tracking protocols
The process of fixation identification--separating and labeling fixations and saccades in eye-tracking protocols--is an essential part of eye-movement data analysis and can have a...
Dario D. Salvucci, Joseph H. Goldberg
TCBB
2010
104views more  TCBB 2010»
14 years 10 months ago
Fast Hinge Detection Algorithms for Flexible Protein Structures
— Analysis of conformational changes is one of the keys to the understanding of protein functions and interactions. For the analysis, we often compare two protein structures, tak...
Tetsuo Shibuya
IJON
2007
134views more  IJON 2007»
14 years 11 months ago
Analysis of SVM regression bounds for variable ranking
This paper addresses the problem of variable ranking for Support Vector Regression. The relevance criteria that we proposed are based on leave-one-out bounds and some variants and...
Alain Rakotomamonjy