Sciweavers

1687 search results - page 63 / 338
» Which pointer analysis should I use
Sort
View
120
Voted
BMCBI
2006
82views more  BMCBI 2006»
15 years 3 months ago
Transcriptomic response to differentiation induction
Background: Microarrays used for gene expression studies yield large amounts of data. The processing of such data typically leads to lists of differentially-regulated genes. A com...
G. W. Patton, Robert M. Stephens, I. A. Sidorov, X...
133
Voted
IEPOL
2010
102views more  IEPOL 2010»
15 years 2 months ago
An antitrust analysis of the case for wireless network neutrality
The ongoing debate about possible implementation of regulatory rules requiring “network neutrality” for wireless telecommunications services is inherently about whether to imp...
Gregory L. Rosston, Michael D. Topper
113
Voted
ICML
1998
IEEE
16 years 4 months ago
A Randomized ANOVA Procedure for Comparing Performance Curves
Three factors are related in analyses of performance curves such as learning curves: the amount of training, the learning algorithm, and performance. Often we want to know whether...
Justus H. Piater, Paul R. Cohen, Xiaoqin Zhang, Mi...
135
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
144
Voted
IJCAI
1989
15 years 4 months ago
A Theorem Prover for Prioritized Circumscription
In a recent paper, Ginsberg shows how a backward-chaining ATMS can be used to construct a theorem prover for circumscription. Here, this work is extended to handle prioritized cir...
Andrew B. Baker, Matthew L. Ginsberg