Sciweavers

8582 search results - page 1652 / 1717
» Here or There
Sort
View
TJS
2002
118views more  TJS 2002»
14 years 9 months ago
The MAGNeT Toolkit: Design, Implementation and Evaluation
Abstract-The current trend in constructing high-performance computing systems is to connect a large number of machines via a fast interconnect or a large-scale network such as the ...
Wu-chun Feng, Mark K. Gardner, Jeffrey R. Hay
VLDB
2002
ACM
108views Database» more  VLDB 2002»
14 years 9 months ago
Generic Database Cost Models for Hierarchical Memory Systems
Accurate prediction of operator execution time is a prerequisite for database query optimization. Although extensively studied for conventional disk-based DBMSs, cost modeling in ...
Stefan Manegold, Peter A. Boncz, Martin L. Kersten
BMCBI
2010
150views more  BMCBI 2010»
14 years 9 months ago
DeltaProt: a software toolbox for comparative genomics
Background: Statistical bioinformatics is the study of biological data sets obtained by new micro-technologies by means of proper statistical methods. For a better understanding o...
Steinar Thorvaldsen, Tor Flå, Nils Willassen
BMCBI
2010
113views more  BMCBI 2010»
14 years 9 months ago
Probabilistic Principal Component Analysis for Metabolomic Data
Background: Data from metabolomic studies are typically complex and high-dimensional. Principal component analysis (PCA) is currently the most widely used statistical technique fo...
Gift Nyamundanda, Lorraine Brennan, Isobel Claire ...
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 9 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
« Prev « First page 1652 / 1717 Last » Next »