Sciweavers

5643 search results - page 1105 / 1129
» Retrieval Evaluation in Practice
Sort
View
ASE
2006
110views more  ASE 2006»
14 years 9 months ago
Runtime recovery and manipulation of software architecture of component-based systems
Recently, more attention is paid to the researches and practices on how to use software architecture in software maintenance and evolution to reduce their complexity and cost. The ...
Gang Huang, Hong Mei, Fuqing Yang
BMCBI
2006
154views more  BMCBI 2006»
14 years 9 months ago
An improved procedure for gene selection from microarray experiments using false discovery rate criterion
Background: A large number of genes usually show differential expressions in a microarray experiment with two types of tissues, and the p-values of a proper statistical test are o...
James J. Yang, Mark C. K. Yang
CN
2006
106views more  CN 2006»
14 years 9 months ago
Model-based end-to-end available bandwidth inference using queueing analysis
End-to-end available bandwidth estimation between Internet hosts is important to understand network congestion and enhance the performance of Quality-of-Service (QoS) demanding ap...
Xiaojun Hei, Brahim Bensaou, Danny H. K. Tsang
CORR
2006
Springer
153views Education» more  CORR 2006»
14 years 9 months ago
Genetic Programming, Validation Sets, and Parsimony Pressure
Fitness functions based on test cases are very common in Genetic Programming (GP). This process can be assimilated to a learning task, with the inference of models from a limited n...
Christian Gagné, Marc Schoenauer, Marc Pari...
CORR
2006
Springer
107views Education» more  CORR 2006»
14 years 9 months ago
Optimal Scheduling of Peer-to-Peer File Dissemination
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are increasingly used for disseminating potentially large files from a server to many end users via the Intern...
Jochen Mundinger, Richard R. Weber, Gideon Weiss
« Prev « First page 1105 / 1129 Last » Next »