Sciweavers

1419 search results - page 280 / 284
» Power Droop Testing
Sort
View
107
Voted
BMCBI
2004
150views more  BMCBI 2004»
14 years 11 months ago
Rank Difference Analysis of Microarrays (RDAM), a novel approach to statistical analysis of microarray expression profiling data
Background: A key step in the analysis of microarray expression profiling data is the identification of genes that display statistically significant changes in expression signals ...
Dietmar E. Martin, Philippe Demougin, Michael N. H...
JUCS
2002
163views more  JUCS 2002»
14 years 11 months ago
Finding Plagiarisms among a Set of Programs with JPlag
: JPlag is a web service that finds pairs of similar programs among a given set of programs. It has successfully been used in practice for detecting plagiarisms among student Java ...
Lutz Prechelt, Guido Malpohl, Michael Philippsen
UMUAI
1998
157views more  UMUAI 1998»
14 years 11 months ago
Bayesian Models for Keyhole Plan Recognition in an Adventure Game
We present an approach to keyhole plan recognition which uses a dynamic belief (Bayesian) network to represent features of the domain that are needed to identify users’ plans and...
David W. Albrecht, Ingrid Zukerman, Ann E. Nichols...
TROB
2002
149views more  TROB 2002»
14 years 11 months ago
LOST: localization-space trails for robot teams
Abstract-We describe Localization-Space Trails (LOST), a method that enables a team of robots to navigate between places of interest in an initially unknown environment using a tra...
Richard T. Vaughan, Kasper Støy, Gaurav S. ...
ITIIS
2010
172views more  ITIIS 2010»
14 years 10 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li