Sciweavers

5591 search results - page 1109 / 1119
» Design patterns: between programming and software design
Sort
View
BMCBI
2007
239views more  BMCBI 2007»
13 years 6 months ago
Pre-processing Agilent microarray data
Background: Pre-processing methods for two-sample long oligonucleotide arrays, specifically the Agilent technology, have not been extensively studied. The goal of this study is to...
Marianna Zahurak, Giovanni Parmigiani, Wayne Yu, R...
ENTCS
2008
137views more  ENTCS 2008»
13 years 6 months ago
Computerizing Mathematical Text with MathLang
Mathematical texts can be computerized in many ways that capture differing amounts of the mathematical meaning. At one end, there is document imaging, which captures the arrangeme...
Fairouz Kamareddine, J. B. Wells
TC
2008
13 years 6 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
ALIFE
1999
13 years 6 months ago
The Creatures Global Digital Ecosystem
An arti cial life entertainment-software product called Creatures was released in Europe in late 1996 and in the United States and Japan in mid-1997. When installed on a domestic c...
Dave Cliff, Stephen Grand
CCS
2010
ACM
13 years 4 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
« Prev « First page 1109 / 1119 Last » Next »