Sciweavers

445 search results - page 80 / 89
» Recco: recombination analysis using cost optimization
Sort
View
TKDE
2002
166views more  TKDE 2002»
14 years 9 months ago
A Comprehensive Analytical Performance Model for Disk Devices under Random Workloads
Our goal with this paper is to contribute a common theoretical framework for studying the performance of disk-storage devices. Understanding the performance behavior of these devi...
Peter Triantafillou, Stavros Christodoulakis, Cost...
SECON
2008
IEEE
15 years 4 months ago
Adaptive Radio Modes in Sensor Networks: How Deep to Sleep?
—Energy-efficient performance is a central challenge in sensor network deployments, and the radio is a major contributor to overall energy node consumption. Current energyeffic...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
87
Voted
CCS
2006
ACM
15 years 1 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
AUSDM
2008
Springer
258views Data Mining» more  AUSDM 2008»
14 years 12 months ago
wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability
Accurate and less invasive personalized predictive medicine can spare many breast cancer patients from receiving complex surgical biopsies, unnecessary adjuvant treatments and its...
Umer Khan, Hyunjung Shin, Jongpill Choi, Minkoo Ki...
CCS
2008
ACM
14 years 12 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...