Sciweavers

2120 search results - page 384 / 424
» Mapping the Gnutella Network
Sort
View
AIIDE
2009
15 years 1 months ago
Investigating the Interplay between Camera Viewpoints, Game Information, and Challenge
Players perceive information about game environments through a virtual camera. While a significant discussion in the industry and in academic research circles has centered around ...
Arnav Jhala, Martin Schwartz, Hector Perez Martine...
108
Voted
GLOBECOM
2008
IEEE
15 years 1 months ago
Blooming Trees for Minimal Perfect Hashing
Abstract—Hash tables are used in many networking applications, such as lookup and packet classification. But the issue of collisions resolution makes their use slow and not suit...
Gianni Antichi, Domenico Ficara, Stefano Giordano,...
AI
2008
Springer
15 years 19 days ago
Semiring induced valuation algebras: Exact and approximate local computation algorithms
Local computation in join trees or acyclic hypertrees has been shown to be linked to a particular algebraic structure, called valuation algebra. There are many models of this alge...
Jürg Kohlas, Nic Wilson
83
Voted
BMCBI
2008
108views more  BMCBI 2008»
15 years 18 days ago
Empirical methods for controlling false positives and estimating confidence in ChIP-Seq peaks
Background: High throughput signature sequencing holds many promises, one of which is the ready identification of in vivo transcription factor binding sites, histone modifications...
David A. Nix, Samir J. Courdy, Kenneth M. Boucher
ISI
2006
Springer
15 years 14 days ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu