Sciweavers

2015 search results - page 23 / 403
» Hidden Software Capabilities
Sort
View
ALMOB
2006
155views more  ALMOB 2006»
13 years 9 months ago
A phylogenetic generalized hidden Markov model for predicting alternatively spliced exons
Background: An important challenge in eukaryotic gene prediction is accurate identification of alternatively spliced exons. Functional transcripts can go undetected in gene expres...
Jonathan E. Allen, Steven L. Salzberg
JDFP
2006
139views more  JDFP 2006»
13 years 9 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
DEXAW
1998
IEEE
92views Database» more  DEXAW 1998»
14 years 1 months ago
Self-Configuring Components for Client-/Server-Applications
A mechanistic view of software component assembly implies exact matching and fitting of the particular components. We argue that components for large-scale software construction s...
Wolfgang Pree, Egbert Althammer, Hermann Sikora
IUI
2000
ACM
14 years 1 months ago
Mining navigation history for recommendation
Although a user’s navigation history contains a lot of hidden information about the relationship between web pages and between users, this information is usually not exploited. ...
Xiaobin Fu, Jay Budzik, Kristian J. Hammond
CC
2002
Springer
126views System Software» more  CC 2002»
13 years 8 months ago
On the hardness of approximating the permanent of structured matrices
We show that for several natural classes of "structured" matrices, including symmetric, circulant, Hankel and Toeplitz matrices, approximating the permanent modulo a prim...
Bruno Codenotti, Igor Shparlinski, Arne Winterhof