Sciweavers

8636 search results - page 1515 / 1728
» How Developers Copy
Sort
View
168
Voted
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 3 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
120
Voted
ANOR
2005
102views more  ANOR 2005»
15 years 3 months ago
Locating Active Sensors on Traffic Networks
Sensors are used to monitor traffic in networks. For example, in transportation networks, they may be used to measure traffic volumes on given arcs and paths of the network. This p...
Monica Gentili, Pitu B. Mirchandani
130
Voted
IPM
2007
129views more  IPM 2007»
15 years 3 months ago
Examining the effectiveness of real-time query expansion
Interactive query expansion (IQE) (c.f. Efthimiadis, 1996) is a potentially useful technique to help searchers formulate improved query statements, and ultimately retrieve better ...
Ryen W. White, Gary Marchionini
143
Voted
IPM
2007
182views more  IPM 2007»
15 years 3 months ago
A probabilistic music recommender considering user opinions and audio features
A recommender system has an obvious appeal in an environment where the amount of on-line information vastly outstrips any individual’s capability to survey. Music recommendation...
Qing Li, Sung-Hyon Myaeng, Byeong Man Kim
139
Voted
BMCBI
2005
153views more  BMCBI 2005»
15 years 3 months ago
A comparative review of estimates of the proportion unchanged genes and the false discovery rate
Background: In the analysis of microarray data one generally produces a vector of p-values that for each gene give the likelihood of obtaining equally strong evidence of change by...
Per Broberg
« Prev « First page 1515 / 1728 Last » Next »