Sciweavers

12745 search results - page 2499 / 2549
» Automating test automation
Sort
View
COMCOM
2006
154views more  COMCOM 2006»
13 years 10 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
COMPUTER
2006
92views more  COMPUTER 2006»
13 years 10 months ago
The Moment Camera
more abstract realms of Impressionism, and more pure Abstraction. The camera, although capable of capturing instants in time, cannot on its own--except in rare instances--truly rec...
Michael F. Cohen, Richard Szeliski
BMCBI
2007
94views more  BMCBI 2007»
13 years 10 months ago
Model based analysis of real-time PCR data from DNA binding dye protocols
Background: Reverse transcription followed by real-time PCR is widely used for quantification of specific mRNA, and with the use of double-stranded DNA binding dyes it is becoming...
Mariano J. Alvarez, Guillermo J. Vila-Ortiz, Maria...
BMCBI
2007
169views more  BMCBI 2007»
13 years 10 months ago
The CRISPRdb database and tools to display CRISPRs and to generate dictionaries of spacers and repeats
Background: In Archeae and Bacteria, the repeated elements called CRISPRs for "clustered regularly interspaced short palindromic repeats" are believed to participate in ...
Ibtissem Grissa, Gilles Vergnaud, Christine Pource...
BMCBI
2007
124views more  BMCBI 2007»
13 years 10 months ago
Protein structural similarity search by Ramachandran codes
Background: Protein structural data has increased exponentially, such that fast and accurate tools are necessary to access structure similarity search. To improve the search speed...
Wei-Cheng Lo, Po-Jung Huang, Chih-Hung Chang, Ping...
« Prev « First page 2499 / 2549 Last » Next »