Sciweavers

2956 search results - page 264 / 592
» Targeted Data Prefetching
Sort
View
149
Voted
CCS
2009
ACM
15 years 10 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
144
Voted
BIOINFORMATICS
2006
118views more  BIOINFORMATICS 2006»
15 years 3 months ago
A probabilistic dynamical model for quantitative inference of the regulatory mechanism of transcription
Motivation Quantitative estimation of the regulatory relationship between transcription factors and genes is a fundamental stepping stone when trying to develop models of cellular...
Guido Sanguinetti, Magnus Rattray, Neil D. Lawrenc...
103
Voted
BMCBI
2010
91views more  BMCBI 2010»
15 years 2 months ago
Washing scaling of GeneChip microarray expression
Background: Post-hybridization washing is an essential part of microarray experiments. Both the quality of the experimental washing protocol and adequate consideration of washing ...
Hans Binder, Knut Krohn, Conrad J. Burden
162
Voted
TNN
2011
200views more  TNN 2011»
14 years 10 months ago
Domain Adaptation via Transfer Component Analysis
Domain adaptation solves a learning problem in a target domain by utilizing the training data in a different but related source domain. Intuitively, discovering a good feature rep...
Sinno Jialin Pan, Ivor W. Tsang, James T. Kwok, Qi...
146
Voted
PODS
2012
ACM
253views Database» more  PODS 2012»
13 years 6 months ago
Local transformations and conjunctive-query equivalence
Over the past several decades, the study of conjunctive queries has occupied a central place in the theory and practice of database systems. In recent years, conjunctive queries h...
Ronald Fagin, Phokion G. Kolaitis