This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
This paper proposes two indicators for predicting the quality of camera model parameters from a set of input images. The first indicator is based on the acutance. It can quickly i...
Background: Modern high throughput experimental techniques such as DNA microarrays often result in large lists of genes. Computational biology tools such as clustering are then us...
Alain B. Tchagang, Alexander Gawronski, Hugo B&eac...
Abstract. The Nine Hole Peg Test (NHPT) is routinely used in clinical environments to evaluate a patient's fine hand control. A physician measures the total time required to i...
Background: The German cDNA Consortium has been cloning full length cDNAs and continued with their exploitation in protein localization experiments and cellular assays. However, t...
Coral del Val, Vladimir Yurjevich Kuryshev, Karl-H...