Sciweavers

4052 search results - page 528 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
SIGMOD
2006
ACM
126views Database» more  SIGMOD 2006»
16 years 5 months ago
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Wireless sensor networks have created new opportunities for data collection in a variety of scenarios, such as environmental and industrial, where we expect data to be temporally ...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard
CIKM
2011
Springer
14 years 4 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
BMCBI
2008
155views more  BMCBI 2008»
15 years 5 months ago
Extending pathways based on gene lists using InterPro domain signatures
Background: High-throughput technologies like functional screens and gene expression analysis produce extended lists of candidate genes. Gene-Set Enrichment Analysis is a commonly...
Florian Hahne, Alexander Mehrle, Dorit Arlt, Annem...
ICCSA
2003
Springer
15 years 10 months ago
A Probabilistic Model for Predicting Software Development Effort
—Recently, Bayesian probabilistic models have been used for predicting software development effort. One of the reasons for the interest in the use of Bayesian probabilistic model...
Parag C. Pendharkar, Girish H. Subramanian, James ...
CONEXT
2006
ACM
15 years 11 months ago
SNARE: sensor node attached reputation evaluator
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. The motivation for tackling this problem comes directly from the...
Ismat K. Maarouf, A. R. Naseer