Sciweavers

1686 search results - page 332 / 338
» Higher Order Deforestation
Sort
View
CCR
2008
76views more  CCR 2008»
14 years 9 months ago
WebClass: adding rigor to manual labeling of traffic anomalies
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Haakon Ringberg, Augustin Soule, Jennifer Rexford
CORR
2010
Springer
120views Education» more  CORR 2010»
14 years 9 months ago
How Much Multiuser Diversity is Required for Energy Limited Multiuser Systems?
Multiuser diversity (MUDiv) is one of the central concepts in multiuser (MU) systems. In particular, MUDiv allows for scheduling among users in order to eliminate the negative effe...
Youngwook Ko, Sergiy A. Vorobyov, Masoud Ardakani
CORR
2008
Springer
158views Education» more  CORR 2008»
14 years 9 months ago
Declarative Combinatorics: Isomorphisms, Hylomorphisms and Hereditarily Finite Data Types in Haskell
This paper is an exploration in a functional programming framework of isomorphisms between elementary data types (natural numbers, sets, finite functions, permutations binary deci...
Paul Tarau
BMCBI
2006
114views more  BMCBI 2006»
14 years 9 months ago
Impact of RNA structure on the prediction of donor and acceptor splice sites
Background: gene identification in genomic DNA sequences by computational methods has become an important task in bioinformatics and computational gene prediction tools are now es...
Sayed-Amir Marashi, Changiz Eslahchi, Hamid Pezesh...
80
Voted
CN
2006
91views more  CN 2006»
14 years 9 months ago
Reputation-based policies that provide the right incentives in peer-to-peer environments
Peer-to-peer are popular environments for exchanging services. A reputation mechanism is a proper means of discovering low-performing peers that fail to provide their services. In...
Thanasis G. Papaioannou, George D. Stamoulis