Sciweavers

372 search results - page 48 / 75
» Trade-Off Results for Connection Management
Sort
View
BMCBI
2005
179views more  BMCBI 2005»
14 years 11 months ago
MARS: Microarray analysis, retrieval, and storage system
Background: Microarray analysis has become a widely used technique for the study of geneexpression patterns on a genomic scale. As more and more laboratories are adopting microarr...
Michael Maurer, Robert Molidor, Alexander Sturn, J...
WWW
2007
ACM
16 years 14 days ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
WWW
2003
ACM
16 years 14 days ago
A Caching Mechanism for Improving Internet based Mobile Ad Hoc Networks Performance
Internet based mobile ad hoc networks (IMANETs) have several limitations to fulfill users' demands to access various kinds of information such as limited accessibility to the...
Sunho Lim, Seung-Taek Park, Wang-Chien Lee, Guohon...
KDD
2009
ACM
216views Data Mining» more  KDD 2009»
16 years 10 days ago
Finding a team of experts in social networks
Given a task T , a pool of individuals X with different skills, and a social network G that captures the compatibility among these individuals, we study the problem of finding X ,...
Theodoros Lappas, Kun Liu, Evimaria Terzi
KDD
2008
ACM
155views Data Mining» more  KDD 2008»
16 years 6 days ago
Factorization meets the neighborhood: a multifaceted collaborative filtering model
Recommender systems provide users with personalized suggestions for products or services. These systems often rely on Collaborating Filtering (CF), where past transactions are ana...
Yehuda Koren