Sciweavers

124 search results - page 24 / 25
» Real World Patterns of Failure in Anonymity Systems
Sort
View
WWW
2008
ACM
15 years 10 months ago
Online auctions efficiency: a survey of ebay auctions
Online auctions have become a pervasive transaction mechanism for e-commerce. As the largest online marketplace in the world, eBay is an attractive case study that enables the stu...
Wenyan Hu, Alvaro Bolivar
86
Voted
BMCBI
2011
14 years 1 months ago
PeakRanger: A cloud-enabled peak caller for ChIP-seq data
Background: Chromatin immunoprecipitation (ChIP), coupled with massively parallel short-read sequencing (seq) is used to probe chromatin dynamics. Although there are many algorith...
Xin Feng, Robert Grossman, Lincoln Stein
CCECE
2009
IEEE
15 years 4 months ago
Inverse data transformation for change detection in wind turbine diagnostics
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...
CCGRID
2004
IEEE
15 years 1 months ago
Supporting quality of service in a non-dedicated opportunistic environment
In this paper we investigate the utilization of nondedicated, opportunistic resources in a desktop environment to provide statistical assurances to a class of QoS sensitive, soft ...
Jin Liang, Klara Nahrstedt
ARCS
2005
Springer
15 years 3 months ago
Adaptive Object Acquisition
We propose an active vision system for object acquisition. The core of our approach is a reinforcement learning module which learns a strategy to scan an object. The agent moves a...
Gabriele Peters, Claus-Peter Alberts, Markus Bries...