Sciweavers

768 search results - page 129 / 154
» Comparing User and Software Information Structures for Compa...
Sort
View
NSPW
2006
ACM
14 years 2 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
JILP
2000
165views more  JILP 2000»
13 years 8 months ago
BMAT - A Binary Matching Tool for Stale Profile Propagation
A major challenge of applying profile-based optimization on large real-world applications is how to capture adequate profile information. A large program, especially a GUI-based a...
Zheng Wang, Ken Pierce, Scott McFarling
BMCBI
2004
154views more  BMCBI 2004»
13 years 8 months ago
Base-By-Base: Single nucleotide-level analysis of whole viral genome alignments
Background: With ever increasing numbers of closely related virus genomes being sequenced, it has become desirable to be able to compare two genomes at a level more detailed than ...
Ryan Brodie, Alex J. Smith, Rachel L. Roper, Vasil...
EDBT
2009
ACM
118views Database» more  EDBT 2009»
14 years 11 days ago
Flower-CDN: a hybrid P2P overlay for efficient query processing in CDN
Many websites with a large user base, e.g., websites of nonprofit organizations, do not have the financial means to install large web-servers or use specialized content distributi...
Manal El Dick, Esther Pacitti, Bettina Kemme
NAR
2006
177views more  NAR 2006»
13 years 8 months ago
PUMA2 - grid-based high-throughput analysis of genomes and metabolic pathways
The PUMA2 system (available at http://compbio.mcs. 10 anl.gov/puma2) is an interactive, integrated bioinformatics environment for high-throughput genetic sequence analysis and met...
Natalia Maltsev, Elizabeth M. Glass, Dinanath Sula...