Sciweavers

1018 search results - page 195 / 204
» Building the Biodiversity Commons
Sort
View
TC
2008
15 years 4 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
BC
2005
84views more  BC 2005»
15 years 4 months ago
A computational model of monkey cortical grating cells
Grating cells were discovered in the V1 and V2 areas of the monkey visual cortex by von der Heydt et al. (1992). These cells responded vigorously to grating patterns of appropriate...
Tino Lourens, Emilia I. Barakova, Hiroshi G. Okuno...
BMCBI
2005
97views more  BMCBI 2005»
15 years 4 months ago
Comparative mapping of sequence-based and structure-based protein domains
Background: Protein domains have long been an ill-defined concept in biology. They are generally described as autonomous folding units with evolutionary and functional independenc...
Ya Zhang, John-Marc Chandonia, Chris H. Q. Ding, S...
BMCBI
2005
87views more  BMCBI 2005»
15 years 4 months ago
BioCreAtIvE Task 1A: gene mention finding evaluation
Background: The biological research literature is a major repository of knowledge. As the amount of literature increases, it will get harder to find the information of interest on...
Alexander S. Yeh, Alexander A. Morgan, Marc E. Col...
TSE
2008
236views more  TSE 2008»
15 years 4 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...