Feature (gene) selection is a frequently used preprocessingtechnology for successful cancer classification task in microarray gene expression data analysis. Widely used gene selection approaches are mainly focused on...
详细信息
Feature (gene) selection is a frequently used preprocessingtechnology for successful cancer classification task in microarray gene expression data analysis. Widely used gene selection approaches are mainly focused on the filter methods. Filter methods are usually considered to be very effective and efficient for high-dimensional data. This paper reviews the existing filter methods, and shows the performance of the representative algorithms on microarray data by extensive experimental study. Surprisingly, the experimental results show that filter methods are not very effective on microarray data. We analyze the cause of the result and provide the basic ideas for potential solutions.
In wireless ad hoc networks, the flooding operation is an important utility function. To solve the broadcast storm problem, some efficient flooding schemes have been proposed. However, there also exist many problems i...
详细信息
In wireless ad hoc networks, the flooding operation is an important utility function. To solve the broadcast storm problem, some efficient flooding schemes have been proposed. However, there also exist many problems in these schemes, such as signal collision. In this paper, we propose an efficient flooding algorithm called EFDA based on the algorithm proposed in [1] (we reference the algorithm as EF1). Through theoretical analysis, our algorithm doesn't affect the local optimality gained by EF1. We have implemented our algorithm in ns-2 simulator, and the results show that exploiting directional antenna can reduce the number of signal collisions and our algorithm achieves better performance than pure flooding and EF1 due to smaller number of signal collisions.
Resources over Internet have such intrinsic characteristics as growth, autonomy and diversity, which have brought many challenges to the efficient sharing and comprehensive utilization of these resources. This paper p...
详细信息
Resources over Internet have such intrinsic characteristics as growth, autonomy and diversity, which have brought many challenges to the efficient sharing and comprehensive utilization of these resources. This paper presents a novel approach for the construction of the Internet-based Virtual Computing Environment (iVCE), whose sig- nificant mechanisms are on-demand aggregation and autonomic collaboration. The iVCE is built on the open infrastructure of the Internet and provides harmonious, transparent and integrated services for end-users and applications. The concept of iVCE is presented and its architectural framework is described by introducing three core concepts, i.e., autonomic element, virtual commonwealth and virtual executor. Then the connotations, functions and related key technologies of each components of the architecture are deeply analyzed with a case study, iVCE for Memory.
Data replication introduces well-known consistency issues. This paper puts forward the question about data dependence in data consistency, which embodies pseudo-conflict updates and update dependency. According to tha...
详细信息
Program mode is a regular trajectory of the execution of a program that is determined by the values of its input variables. By exploiting program modes we may make Worst Case Execution Time (WCET) analysis more precis...
详细信息
ISBN:
(纸本)1595934081
Program mode is a regular trajectory of the execution of a program that is determined by the values of its input variables. By exploiting program modes we may make Worst Case Execution Time (WCET) analysis more precise. This paper presents a novel method to automatically find program modes and calculate the WCET of programs. It consists of two phases. In phase one, we firstly automatically find the modes of a program by mode-relevant program slicing;then we compute the precondition for each mode using a path-wise test data generation method;after that, we can either conclude that it is an infeasible path, or get its precondition. In phase two, we calculate the WCET estimate of each given mode for modern RISC processors with caches and pipelines. The experiments are demonstrated to show the effectiveness of the method. Copyright 2006 ACM.
Memory-intensive applications often suffer from the poor performance of disk swapping when memory is inadequate. Remote memory sharing schemes, which provide a remote memory that is faster than the local hard disk, ar...
详细信息
Meteorology Grid Computing aims to provide scientist with seamless, reliable, secure and inexpensive access to meteorological resources. In this paper, we presented a semantic-based meteorology grid service registry, ...
详细信息
暂无评论