Sciweavers

2015 search results - page 189 / 403
» Hidden Software Capabilities
Sort
View
121
Voted
BMCBI
2008
124views more  BMCBI 2008»
15 years 2 months ago
Literature-aided meta-analysis of microarray data: a compendium study on muscle development and disease
Background: Comparative analysis of expression microarray studies is difficult due to the large influence of technical factors on experimental outcome. Still, the identified diffe...
Rob Jelier, Peter A. C. 't Hoen, Ellen Sterrenburg...
116
Voted
ENTCS
2006
128views more  ENTCS 2006»
15 years 2 months ago
Web Verification: Perspective and Challenges
The Web poses novel and interesting problems for both programming language design and verification--and their intersection. This paper provides a personal outline of one thread of...
Shriram Krishnamurthi
141
Voted
ISF
2008
114views more  ISF 2008»
15 years 2 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
COMPUTER
2007
135views more  COMPUTER 2007»
15 years 2 months ago
A Language for Human Action
and therefore should be implemented outside the sensory-motor system. This way, meaning for a concept amounts to the content of a symbolic expression, a definition of the concept ...
Gutemberg Guerra-Filho, Yiannis Aloimonos
127
Voted
JMM2
2007
132views more  JMM2 2007»
15 years 2 months ago
Contour Tracking of Targets with Large Aspect Change
In this paper we present a novel method for tracking contour of a moving rigid object in natural video sequences from a mobile camera. While a mobile camera is keeping track of a m...
Behzad Jamasbi, Seyed Ahmad Motamedi, Alireza Behr...