Sciweavers

1882 search results - page 337 / 377
» A User Interaction Model for NFC Enabled Applications
Sort
View
BMCBI
2008
136views more  BMCBI 2008»
13 years 8 months ago
An efficient method for the prediction of deleterious multiple-point mutations in the secondary structure of RNAs using suboptim
Background: RNAmute is an interactive Java application which, given an RNA sequence, calculates the secondary structure of all single point mutations and organizes them into categ...
Alexander Churkin, Danny Barash
GRID
2006
Springer
13 years 8 months ago
Toward an On-Demand Restricted Delegation Mechanism for Grids
Grids are intended to enable cross-organizational interactions which makes Grid security a challenging and nontrivial issue. In Grids, delegation is a key facility that can be used...
Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
13 years 8 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
ADL
1998
Springer
189views Digital Library» more  ADL 1998»
14 years 27 days ago
Semantic Relations in a Medical Digital Library
ct In this paper, we describe the VesaliusTM Project, a multi-modal collection of anatomical resourcesunder development at Columbia University. 1 Our focus is on the need for navig...
Nina Wacholder, Celina Imielinska, Judith Klavans,...
MM
2006
ACM
142views Multimedia» more  MM 2006»
14 years 2 months ago
Large-scale video retrieval via semantic classification
ons for this project. Most recent ones are listed at the end of this abstract. In the future, feature selection will be integrated in the multi-class EM algorithm to improve the pe...
Hangzai Luo, Jianping Fan