Sciweavers

5273 search results - page 965 / 1055
» Secured Web Access
Sort
View
SOCA
2010
IEEE
14 years 11 months ago
Exploiting multicores to optimize business process execution
While modern CPUs offer an increasing number of cores with shared caches, prevailing execution engines for business processes, workflows, or Web service compositions have not been ...
Achille Peternier, Daniele Bonetta, Cesare Pautass...
CISIS
2009
IEEE
14 years 11 months ago
The Health-e-Waterways Project - Data Integration for Smarter, Collaborative, Whole-of-Water Cycle Management
The Health-e-Waterways Project is a collaboration between the University of Queensland, Microsoft Research and the South East Queensland Healthy Waterways Partnership (SEQ-HWP) (a...
Abdulmonem Alabri, Jane Hunter, Catharine van Inge...
125
Voted
NAR
2010
123views more  NAR 2010»
14 years 8 months ago
Discovering causal signaling pathways through gene-expression patterns
High-throughput gene-expression studies result in lists of differentially expressed genes. Most current meta-analyses of these gene lists include searching for significant members...
Jignesh R. Parikh, Bertram Klinger, Yu Xia, Jarrod...
TKDE
2010
161views more  TKDE 2010»
14 years 8 months ago
A Deductive Spreadsheet System for End Users
We exploit the spreadsheet metaphor to make deductive problem-solving methods available to the vast population of spreadsheet end users. In particular, we show how the function-bas...
Marcelo Tallis, Robert M. Balzer
ICASSP
2011
IEEE
14 years 5 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin