Sciweavers

924 search results - page 94 / 185
» One Application of the Parallelization Tool of Master-Slave ...
Sort
View
BMCBI
2010
65views more  BMCBI 2010»
14 years 10 months ago
VIPR: A probabilistic algorithm for analysis of microbial detection microarrays
Background: All infectious disease oriented clinical diagnostic assays in use today focus on detecting the presence of a single, well defined target agent or a set of agents. In r...
Adam F. Allred, Guang Wu, Tuya Wulan, Kael F. Fisc...
CSL
2008
Springer
14 years 11 months ago
Syntactic Metatheory of Higher-Order Subtyping
Abstract. We present a new proof of decidability of higher-order subtyping in the presence of bounded quantification. The algorithm is formulated as a judgement which operates on b...
Andreas Abel, Dulma Rodriguez
ASPLOS
2010
ACM
15 years 4 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli
WCRE
2000
IEEE
15 years 2 months ago
Towards Portable Source Code Representations using XML
One of the most important issue in source code analysis and software re-engineering is the representation of ode text at an abstraction level and form suitable for algorithmic pro...
Evan Mamas, Kostas Kontogiannis
ASE
2002
141views more  ASE 2002»
14 years 9 months ago
On the Automatic Recovery of Style-Specific Architectural Relations in Software Systems
The cost of maintaining a software system over a long period of time far exceeds its initial development cost. Much of the maintenance cost is attributed to the time required by ne...
Martin Traverso, Spiros Mancoridis