Sciweavers

2486 search results - page 480 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
BMCBI
2008
125views more  BMCBI 2008»
13 years 8 months ago
Tandem duplication, circular permutation, molecular adaptation: how Solanaceae resist pests via inhibitors
Background: The Potato type II (Pot II) family of proteinase inhibitors plays critical roles in the defense system of plants from Solanaceae family against pests. To better unders...
Lesheng Kong, Shoba Ranganathan
BMCBI
2005
131views more  BMCBI 2005»
13 years 8 months ago
Regularized Least Squares Cancer Classifiers from DNA microarray data
Background: The advent of the technology of DNA microarrays constitutes an epochal change in the classification and discovery of different types of cancer because the information ...
Nicola Ancona, Rosalia Maglietta, Annarita D'Addab...
MOBISYS
2008
ACM
14 years 8 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
CONCURRENCY
2002
152views more  CONCURRENCY 2002»
13 years 8 months ago
The Legion Grid Portal
-- The Legion Grid Portal is an interface to a grid system. Users interact with the portal, and hence a grid through an intuitive interface from which they can view files, submit a...
Anand Natrajan, Anh Nguyen-Tuong, Marty Humphrey, ...
ACL
2010
13 years 6 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder