Sciweavers

16070 search results - page 183 / 3214
» Identifying
Sort
View
BMCBI
2010
102views more  BMCBI 2010»
15 years 4 months ago
Identification of recurrent regions of copy-number variants across multiple individuals
Background: Algorithms and software for CNV detection have been developed, but they detect the CNV regions sample-by-sample with individual-specific breakpoints, while common CNV ...
Teo Shu Mei, Agus Salim, Stefano Calza, Ku Chee Se...
ICDE
2009
IEEE
154views Database» more  ICDE 2009»
16 years 6 months ago
A General Proximity Privacy Principle
Recent years have witnessed ever-increasing concerns about individual privacy in numerous data dissemination applications that involve private personal information, e.g., medical...
Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, C...
HPCA
2004
IEEE
16 years 4 months ago
Creating Converged Trace Schedules Using String Matching
This paper focuses on generating efficient software pipelined schedules for in-order machines, which we call Converged Trace Schedules. For a candidate loop, we form a string of t...
Satish Narayanasamy, Yuanfang Hu, Suleyman Sair, B...
CHI
2002
ACM
16 years 4 months ago
What is that?: gesturing to determine device identity
Computing devices can seamlessly recognize one another as they join and leave a wireless network, but users often experience difficulty identifying a desired device from a continu...
Colin Swindells, Kori M. Inkpen
RECOMB
2005
Springer
16 years 4 months ago
Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks
Abstract. The interpretation of large-scale protein network data depends on our ability to identify significant sub-structures in the data, a computationally intensive task. Here w...
Jacob Scott, Trey Ideker, Richard M. Karp, Roded S...