Sciweavers

280 search results - page 55 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
106
Voted
BMCBI
2007
183views more  BMCBI 2007»
15 years 1 months ago
Considerations in the identification of functional RNA structural elements in genomic alignments
Background: Accurate identification of novel, functional noncoding (nc) RNA features in genome sequence has proven more difficult than for exons. Current algorithms identify and s...
Tomas Babak, Benjamin J. Blencowe, Timothy R. Hugh...
117
Voted
JSAC
2007
104views more  JSAC 2007»
15 years 1 months ago
Characterizing Peer-to-Peer Streaming Flows
— The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming serve...
Chuan Wu, Baochun Li, Shuqiao Zhao
WWW
2009
ACM
16 years 1 months ago
Smart Miner: a new framework for mining large scale web usage data
In this paper, we propose a novel framework called SmartMiner for web usage mining problem which uses link information for producing accurate user sessions and frequent navigation...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar...
143
Voted
COORDINATION
2009
Springer
16 years 1 months ago
Enhanced Coordination in Sensor Networks through Flexible Service Provisioning
: Heterogeneous wireless sensor networks represent a challenging programming environment. Servilla addresses this by offering a new middleware framework that provides service provi...
Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
144
Voted
AIIA
2007
Springer
15 years 7 months ago
A Hierarchical Clustering Procedure for Semantically Annotated Resources
Abstract. A clustering method is presented which can be applied to relational knowledge bases. It can be used to discover interesting groupings of resources through their (semantic...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito