Sciweavers

2421 search results - page 377 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BMCBI
2010
115views more  BMCBI 2010»
15 years 4 months ago
Non-coding RNA detection methods combined to improve usability, reproducibility and precision
Background: Non-coding RNAs gain more attention as their diverse roles in many cellular processes are discovered. At the same time, the need for efficient computational prediction...
Peter Raasch, Ulf Schmitz, Nadja Patenge, Julio Ve...
AIM
2004
15 years 4 months ago
An AI Planning-based Tool for Scheduling Satellite Nominal Operations
Satellite domains are becoming a fashionable area of research within the AI community due to the complexity of the problems that these domains need to solve. With the current US a...
María Dolores Rodríguez-Moreno, Dani...
VLDB
2007
ACM
121views Database» more  VLDB 2007»
16 years 4 months ago
Efficient Keyword Search over Virtual XML Views
Emerging applications such as personalized portals, enterprise search and web integration systems often require keyword search over semi-structured views. However, traditional inf...
Feng Shao, Lin Guo, Chavdar Botev, Anand Bhaskar, ...
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
16 years 4 months ago
Constrained Optimalities in Query Personalization
Personalization is a powerful mechanism that helps users to cope with the abundance of information on the Web. Database query personalization achieves this by dynamically construc...
Georgia Koutrika, Yannis E. Ioannidis
MICRO
1997
IEEE
82views Hardware» more  MICRO 1997»
15 years 8 months ago
Procedure Based Program Compression
Cost and power consumption are two of the most important design factors for many embedded systems, particularly consumer devices. Products such as Personal Digital Assistants, pag...
Darko Kirovski, Johnson Kin, William H. Mangione-S...