Sciweavers

3082 search results - page 554 / 617
» Deviation Analysis: A New Use of Model Checking
Sort
View
JSAC
2008
165views more  JSAC 2008»
14 years 12 months ago
Energy-Efficient Routing Schemes for Underwater Acoustic Networks
Interest in underwater acoustic networks has grown rapidly with the desire to monitor the large portion of the world covered by oceans. Fundamental differences between underwater a...
Michele Zorzi, Paolo Casari, Nicola Baldo, Albert ...
BMCBI
2005
123views more  BMCBI 2005»
14 years 11 months ago
PSI-BLAST-ISS: an intermediate sequence search tool for estimation of the position-specific alignment reliability
Background: Protein sequence alignments have become indispensable for virtually any evolutionary, structural or functional study involving proteins. Modern sequence search and com...
Mindaugas Margelevicius, Ceslovas Venclovas
SIGIR
2012
ACM
13 years 2 months ago
An exploration of ranking heuristics in mobile local search
Users increasingly rely on their mobile devices to search local entities, typically businesses, while on the go. Even though recent work has recognized that the ranking signals in...
Yuanhua Lv, Dimitrios Lymberopoulos, Qiang Wu
112
Voted
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
16 years 12 days ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
KBSE
2005
IEEE
15 years 5 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer