Sciweavers

3042 search results - page 532 / 609
» Designing for all users: including the odd users
Sort
View
BMCBI
2010
144views more  BMCBI 2010»
14 years 4 months ago
Optimizing Transformations for Automated, High Throughput Analysis of Flow Cytometry Data
Background: In a high throughput setting, effective flow cytometry data analysis depends heavily on proper data preprocessing. While usual preprocessing steps of quality assessmen...
Greg Finak, Juan-Manuel Perez, Andrew Weng, Raphae...
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
14 years 1 months ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
13 years 9 days ago
The untold story of the clones: content-agnostic factors that impact YouTube video popularity
Video dissemination through sites such as YouTube can have widespread impacts on opinions, thoughts, and cultures. Not all videos will reach the same popularity and have the same ...
Youmna Borghol, Sebastien Ardon, Niklas Carlsson, ...
EDBT
2009
ACM
170views Database» more  EDBT 2009»
15 years 1 months ago
Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases
The classic Generalized Sequential Patterns (GSP) algorithm returns all frequent sequences present in a database. However, usually a few ones are interesting from a user's po...
Leticia I. Gómez, Alejandro A. Vaisman
TWC
2010
14 years 4 months ago
Splitting algorithms for fast relay selection: generalizations, analysis, and a unified view
Relay selection for cooperative communications promises significant performance improvements, and is, therefore, attracting, considerable attention. While several criteria have be...
Virag Shah, Neelesh B. Mehta, Raymond Yim