Sciweavers

310 search results - page 59 / 62
» Automating information overload: linking databases to the We...
Sort
View
IEEECIT
2010
IEEE
13 years 5 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
BMCBI
2006
190views more  BMCBI 2006»
13 years 7 months ago
SNPs3D: Candidate gene and SNP selection for association studies
Background: The relationship between disease susceptibility and genetic variation is complex, and many different types of data are relevant. We describe a web resource and databas...
Peng Yue, Eugene Melamud, John Moult
GIS
2004
ACM
14 years 8 months ago
Automatically and accurately conflating orthoimagery and street maps
Recent growth of the geospatial information on the web has made it possible to easily access various maps and orthoimagery. By integrating these maps and imagery, we can create in...
Ching-Chien Chen, Craig A. Knoblock, Cyrus Shahabi...
BMCBI
2007
122views more  BMCBI 2007»
13 years 7 months ago
TAP score: torsion angle propensity normalization applied to local protein structure evaluation
Background: Experimentally determined protein structures may contain errors and require validation. Conformational criteria based on the Ramachandran plot are mainly used to disti...
Silvio C. E. Tosatto, Roberto Battistutta
BMCBI
2006
143views more  BMCBI 2006»
13 years 7 months ago
IsoSVM - Distinguishing isoforms and paralogs on the protein level
Background: Recent progress in cDNA and EST sequencing is yielding a deluge of sequence data. Like database search results and proteome databases, this data gives rise to inferred...
Michael Spitzer, Stefan Lorkowski, Paul Cullen, Al...