Sciweavers

7121 search results - page 1420 / 1425
» Functions as Session-Typed Processes
Sort
View
JCC
2011
154views more  JCC 2011»
12 years 10 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
JSS
2011
126views more  JSS 2011»
12 years 10 months ago
A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems
Forecasting workflow activity durations is of great importance to support satisfactory QoS in workflow systems. Traditionally, a workflow system is often designed to facilitate the...
Xiao Liu, Zhiwei Ni, Dong Yuan, Yuan-Chun Jiang, Z...
NAR
2011
340views Computer Vision» more  NAR 2011»
12 years 10 months ago
CCDB: a curated database of genes involved in cervix cancer
The Cervical Cancer gene DataBase (CCDB, http:// crdd.osdd.net/raghava/ccdb) is a manually curated catalog of experimentally validated genes that are thought, or are known to be i...
Subhash M. Agarwal, Dhwani Raghav, Harinder Singh,...
ARESEC
2011
117views more  ARESEC 2011»
12 years 7 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
CIKM
2011
Springer
12 years 7 months ago
A probabilistic method for inferring preferences from clicks
Evaluating rankers using implicit feedback, such as clicks on documents in a result list, is an increasingly popular alternative to traditional evaluation methods based on explici...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke
« Prev « First page 1420 / 1425 Last » Next »