Sciweavers

246 search results - page 45 / 50
» Acquisition of expanding targets
Sort
View
DESRIST
2009
Springer
109views Education» more  DESRIST 2009»
14 years 3 days ago
The constitutive and the instrumental in social design
Simon’s The Sciences of the Artificial is rightly influential as a founding text in design research in the information systems field (IS). Simon’s contributions in the same vo...
Murali Venkatesh
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
13 years 11 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
ANLP
1997
190views more  ANLP 1997»
13 years 8 months ago
Disambiguation of Proper Names in Text
Identifying the occurrences of proper names in text and the entities they refer to can be a difficult task because of the manyto-many mapping between names and their referents. We...
Nina Wacholder, Yael Ravin, Misook Choi
BMCBI
2010
177views more  BMCBI 2010»
13 years 7 months ago
Modular composition predicts kinase/substrate interactions
Background: Phosphorylation events direct the flow of signals and metabolites along cellular protein networks. Current annotations of kinase-substrate binding events are far from ...
Yichuan Liu, Aydin Tozeren
BMCBI
2010
102views more  BMCBI 2010»
13 years 7 months ago
Peptide binding predictions for HLA DR, DP and DQ molecules
Background: MHC class II binding predictions are widely used to identify epitope candidates in infectious agents, allergens, cancer and autoantigens. The vast majority of predicti...
Peng Wang, John Sidney, Yohan Kim, Alessandro Sett...