Sciweavers

1964 search results - page 380 / 393
» informs 2011
Sort
View
FUIN
2011
358views Cryptology» more  FUIN 2011»
14 years 29 days ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
HCI
2011
14 years 28 days ago
Modeling Pharmacokinetics and Pharmacodynamics on a Mobile Device to Help Caffeine Users
We introduce a mobile device application that displays key information about caffeine: the pharmacokinetics (time course of drug levels) and pharmacodynamics (the effects of caffei...
Frank E. Ritter, Kuo-Chuan (Martin) Yeh
72
Voted
ICSE
2011
IEEE-ACM
14 years 28 days ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
INFOCOM
2011
IEEE
14 years 27 days ago
QoF: Towards comprehensive path quality measurement in wireless sensor networks
Abstract—Due to its large scale and constrained communication radius, a wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet along a sequence...
Jiliang Wang, Yunhao Liu, Mo Li, Wei Dong, Yuan He
INFOCOM
2011
IEEE
14 years 27 days ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra