Sciweavers

11121 search results - page 2047 / 2225
» Computing with Continuous Change
Sort
View
151
Voted
CONEXT
2009
ACM
15 years 4 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
128
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Fair WLAN backhaul aggregation
Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP a...
Domenico Giustiniano, Eduard Goma Llairo, Alberto ...
138
Voted
ADHOC
2007
139views more  ADHOC 2007»
15 years 3 months ago
Bounded-distance multi-clusterhead formation in wireless ad hoc networks
We present a clustering technique addressing redundancy for bounded-distance clusters, which means being able to determine the minimum number of cluster-heads per node, and the ma...
Marco Aurélio Spohn, J. J. Garcia-Luna-Acev...
126
Voted
BIOINFORMATICS
2008
106views more  BIOINFORMATICS 2008»
15 years 3 months ago
Small RNA gene identification and mRNA target predictions in bacteria
Motivation: Bacterial small ribonucleic acids (sRNAs) that are not ribosomal and transfer or messenger RNAs were initially identified in the sixties whereas their molecular functi...
Christophe Pichon, Brice Felden
147
Voted
BMCBI
2010
174views more  BMCBI 2010»
15 years 3 months ago
The effect of prior assumptions over the weights in BayesPI with application to study protein-DNA interactions from ChIP-based h
Background: To further understand the implementation of hyperparameters re-estimation technique in Bayesian hierarchical model, we added two more prior assumptions over the weight...
Junbai Wang
« Prev « First page 2047 / 2225 Last » Next »