Sciweavers

5344 search results - page 933 / 1069
» Privacy-Preserving Set Operations
Sort
View
125
Voted
DC
2010
15 years 3 months ago
Refined quorum systems
It is considered good distributed computing practice to devise object implementations that tolerate contention, periods of asynchrony and a large number of failures, but perform f...
Rachid Guerraoui, Marko Vukolic
GC
2008
Springer
15 years 3 months ago
Laplacian Spectrum of Weakly Quasi-threshold Graphs
In this paper we study the class of weakly quasi-threshold graphs that are obtained from a vertex by recursively applying the operations (i) adding a new isolated vertex, (ii) addi...
R. B. Bapat, A. K. Lal, Sukanta Pati
136
Voted
BMCBI
2006
129views more  BMCBI 2006»
15 years 3 months ago
Identifying genes that contribute most to good classification in microarrays
Background: The goal of most microarray studies is either the identification of genes that are most differentially expressed or the creation of a good classification rule. The dis...
Stuart G. Baker, Barnett S. Kramer
BMCBI
2006
194views more  BMCBI 2006»
15 years 3 months ago
Novel metaheuristic for parameter estimation in nonlinear dynamic biological systems
Background: We consider the problem of parameter estimation (model calibration) in nonlinear dynamic models of biological systems. Due to the frequent ill-conditioning and multi-m...
Maria Rodriguez-Fernandez, Jose A. Egea, Julio R. ...
151
Voted
CGF
2006
191views more  CGF 2006»
15 years 3 months ago
A Robust Two-Step Procedure for Quad-Dominant Remeshing
We propose a new technique for quad-dominant remeshing which separates the local regularity requirements from the global alignment requirements by working in two steps. In the fir...
Martin Marinov, Leif Kobbelt