Sciweavers

143 search results - page 17 / 29
» Gaining Process Information from Clinical Practice Guideline...
Sort
View
SIGIR
2011
ACM
12 years 10 months ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
BMCBI
2007
126views more  BMCBI 2007»
13 years 7 months ago
Reconstruction of cell population dynamics using CFSE
Background: Quantifying cell division and death is central to many studies in the biological sciences. The fluorescent dye CFSE allows the tracking of cell division in vitro and i...
Andrew Yates, Cliburn Chan, Jessica Strid, Simon M...
HASE
2008
IEEE
14 years 2 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...
PPOPP
2005
ACM
14 years 1 months ago
Exposing speculative thread parallelism in SPEC2000
As increasing the performance of single-threaded processors becomes increasingly difficult, consumer desktop processors are moving toward multi-core designs. One way to enhance th...
Manohar K. Prabhu, Kunle Olukotun
BMCBI
2007
107views more  BMCBI 2007»
13 years 7 months ago
Prediction of potential drug targets based on simple sequence properties
Background: During the past decades, research and development in drug discovery have attracted much attention and efforts. However, only 324 drug targets are known for clinical dr...
Qingliang Li, Luhua Lai