Sciweavers

516 search results - page 98 / 104
» A Critical Analysis of Empirical Research in Software Testin...
Sort
View
BIBE
2007
IEEE
127views Bioinformatics» more  BIBE 2007»
14 years 1 months ago
A Heuristic for Phylogenetic Reconstruction Using Transposition
Abstract—Because of the advent of high-throughput sequencing and the consequent reduction in cost of sequencing, many organisms have been completely sequenced and most of their g...
Feng Yue, Meng Zhang, Jijun Tang
BMCBI
2007
139views more  BMCBI 2007»
13 years 7 months ago
XSTREAM: A practical algorithm for identification and architecture modeling of tandem repeats in protein sequences
Background: Biological sequence repeats arranged in tandem patterns are widespread in DNA and proteins. While many software tools have been designed to detect DNA tandem repeats (...
Aaron M. Newman, James B. Cooper
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 23 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
IUI
2006
ACM
14 years 1 months ago
Towards intelligent QA interfaces: discourse processing for context questions
Question answering (QA) systems take users’ natural language questions and retrieve relevant answers from large repositories of free texts. Despite recent progress in QA researc...
Mingyu Sun, Joyce Y. Chai
ICSM
1995
IEEE
13 years 11 months ago
Discovering relationships between service and customer satisfaction
Organizations spend significant resources tracking customer satisfaction and managing service delivery. Although a great deal of effort is expended in understanding what goes on w...
Michael Buckley, Ram Chillarege