Sciweavers

1265 search results - page 238 / 253
» Finding the Key to a Synapse
Sort
View
ENTCS
2006
155views more  ENTCS 2006»
13 years 7 months ago
Mathematical Service Trading Based on Equational Matching
Mathematical software libraries provide many computational services. Mathematical operators properties can be used to combine several services in order to provide more complex one...
Aurélie Hurault, Marc Pantel
BMCBI
2007
149views more  BMCBI 2007»
13 years 7 months ago
Identification of tissue-specific cis-regulatory modules based on interactions between transcription factors
Background: Evolutionary conservation has been used successfully to help identify cis-acting DNA regions that are important in regulating tissue-specific gene expression. Motivate...
Xueping Yu, Jimmy J. Lin, Donald J. Zack, Jiang Qi...
ESWA
2006
176views more  ESWA 2006»
13 years 7 months ago
Build grid-enabled large-scale collaboration environment in e-Learning grid
As a new branch of grid computing, e-Learning grid is emerging as a nationwide e-Learning infrastructure, which can provide innovative learning experience for learners. In such a ...
YuShun Li, ShengWen Yang, Jinlei Jiang, Meilin Shi
IIE
2006
121views more  IIE 2006»
13 years 7 months ago
High School Teachers' Course Designs and Their Professional Knowledge of Online Teaching
This paper deals with the process of expanding the virtual secondary education school network, aiming to provide daily basis, online teaching. The context of this research is the E...
Teemu Valtonen, Jari Kukkonen, Anu Wulff
IJDE
2006
95views more  IJDE 2006»
13 years 7 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum