Sciweavers

1076 search results - page 161 / 216
» Feature Identification: A Novel Approach and a Case Study
Sort
View
120
Voted
TPDS
2010
113views more  TPDS 2010»
14 years 7 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
ISBI
2008
IEEE
16 years 1 months ago
Automated comparison of protein subcellular location patterns between images of normal and cancerous tissues
Early cancer diagnosis and evaluation of cancer progression during treatment are two important factors for clinical therapy. In this study we propose a novel approach which automa...
Estelle Glory, Justin Newberg, Robert F. Murphy
108
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Address assignment sensitive variable partitioning and scheduling for DSPS with multiple memory banks
Multiple memory banks design is employed in many high performance DSP processors. This architectural feature supports higher memory bandwidth by allowing multiple data memory acce...
Chun Jason Xue, Tiantian Liu, Zili Shao, Jingtong ...
119
Voted
BMCBI
2010
164views more  BMCBI 2010»
15 years 21 days ago
Flexible network reconstruction from relational databases with Cytoscape and CytoSQL
Background: Molecular interaction networks can be efficiently studied using network visualization software such as Cytoscape. The relevant nodes, edges and their attributes can be...
Kris Laukens, Jens Hollunder, Thanh Hai Dang, Geer...
101
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Target-Based Power Control for Queueing Systems with Applications to Packet Switches
—Many data center devices, for instance packet switches, can be modeled within the context of resource constrained queueing systems. In this paper, we define a novel algorithm c...
Benjamin Yolken, Dimitrios Tsamis, Nicholas Bambos