Sciweavers

2093 search results - page 398 / 419
» Business Process Modelling and Purpose Analysis for Requirem...
Sort
View
BMCBI
2006
92views more  BMCBI 2006»
13 years 8 months ago
Demonstration of two novel methods for predicting functional siRNA efficiency
Background: siRNAs are small RNAs that serve as sequence determinants during the gene silencing process called RNA interference (RNAi). It is well know that siRNA efficiency is cr...
Peilin Jia, Tieliu Shi, Yu-Dong Cai, Yixue Li
SIGCSE
2009
ACM
143views Education» more  SIGCSE 2009»
14 years 2 months ago
Thinking about computational thinking
Jeannette Wing’s call for teaching Computational Thinking (CT) as a formative skill on par with reading, writing, and arithmetic places computer science in the category of basic...
James J. Lu, George H. L. Fletcher
IMC
2006
ACM
14 years 1 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
ACSAC
2002
IEEE
14 years 26 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
SIGIR
2005
ACM
14 years 1 months ago
Server selection methods in hybrid portal search
The TREC .GOV collection makes a valuable web testbed for distributed information retrieval methods because it is naturally partitioned and includes 725 web-oriented queries with ...
David Hawking, Paul Thomas