Sciweavers

20573 search results - page 3880 / 4115
» The Computer's New Clothes
Sort
View
ICDCS
2012
IEEE
13 years 3 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
135
Voted
EUROSYS
2006
ACM
15 years 9 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
127
Voted
CIKM
2007
Springer
15 years 7 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
BMCBI
2010
113views more  BMCBI 2010»
15 years 26 days ago
Improving performance of mammalian microRNA target prediction
Background: MicroRNAs (miRNAs) are single-stranded non-coding RNAs known to regulate a wide range of cellular processes by silencing the gene expression at the protein and/or mRNA...
Hui Liu, Dong Yue, Yidong Chen, Shou-Jiang Gao, Yu...
BMCBI
2007
127views more  BMCBI 2007»
15 years 23 days ago
Predicting the phenotypic effects of non-synonymous single nucleotide polymorphisms based on support vector machines
Background: Human genetic variations primarily result from single nucleotide polymorphisms (SNPs) that occur approximately every 1000 bases in the overall human population. The no...
Jian Tian, Ningfeng Wu, Xuexia Guo, Jun Guo, Juhua...
« Prev « First page 3880 / 4115 Last » Next »