Sciweavers

8294 search results - page 1645 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
ICDCS
2010
IEEE
15 years 3 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
BMCBI
2007
128views more  BMCBI 2007»
14 years 12 months ago
Absolute estimation of initial concentrations of amplicon in a real-time RT-PCR process
Background: Since real time PCR was first developed, several approaches to estimating the initial quantity of template in an RT-PCR reaction have been tried. While initially only ...
Marjo V. Smith, Chris R. Miller, Michael Kohn, Nig...
115
Voted
BMCBI
2006
147views more  BMCBI 2006»
14 years 11 months ago
QPath: a method for querying pathways in a protein-protein interaction network
Background: Sequence comparison is one of the most prominent tools in biological research, and is instrumental in studying gene function and evolution. The rapid development of hi...
Tomer Shlomi, Daniel Segal, Eytan Ruppin, Roded Sh...
TASLP
2010
133views more  TASLP 2010»
14 years 6 months ago
Unsupervised Equalization of Lombard Effect for Speech Recognition in Noisy Adverse Environments
In the presence of environmental noise, speakers tend to adjust their speech production in an effort to preserve intelligible communication. The noise-induced speech adjustments, c...
Hynek Boril, John H. L. Hansen
CCS
2004
ACM
15 years 5 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
« Prev « First page 1645 / 1659 Last » Next »