Sciweavers

5829 search results - page 1092 / 1166
» The Practice of Cluster Analysis
Sort
View
CIKM
2011
Springer
13 years 12 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
BMCBI
2002
89views more  BMCBI 2002»
14 years 11 months ago
Sources of variability and effect of experimental approach on expression profiling data interpretation
Background: We provide a systematic study of the sources of variability in expression profiling data using 56 RNAs isolated from human muscle biopsies (34 Affymetrix MuscleChip ar...
Marina Bakay, Yi-Wen Chen, Rehannah H. A. Borup, P...
SPAA
2009
ACM
16 years 13 days ago
Dynamic external hashing: the limit of buffering
Hash tables are one of the most fundamental data structures in computer science, in both theory and practice. They are especially useful in external memory, where their query perf...
Zhewei Wei, Ke Yi, Qin Zhang
144
Voted
ACMSE
2008
ACM
15 years 1 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
ECCV
2000
Springer
16 years 1 months ago
Model-Based Initialisation for Segmentation
The initialisation of segmentation methods aiming at the localisation of biological structures in medical imagery is frequently regarded as a given precondition. In practice, howev...
Christian Brechbühler, Gábor Szé...
« Prev « First page 1092 / 1166 Last » Next »