Sciweavers

180 search results - page 34 / 36
» How Thorough Is Thorough Enough
Sort
View
BMCBI
2007
114views more  BMCBI 2007»
13 years 8 months ago
False occurrences of functional motifs in protein sequences highlight evolutionary constraints
Background: False occurrences of functional motifs in protein sequences can be considered as random events due solely to the sequence composition of a proteome. Here we use a nume...
Allegra Via, Pier Federico Gherardini, Enrico Ferr...
CAD
2008
Springer
13 years 8 months ago
Tracking product specification dependencies in collaborative design for conflict management
The main difficulty associated with a collaborative design process is understanding the product data exchanged during design. Efficient and effective coordination of design activi...
Mohamed-Zied Ouertani, Lilia Gzara Yesilbas
IJDE
2006
95views more  IJDE 2006»
13 years 8 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
AIL
2004
107views more  AIL 2004»
13 years 8 months ago
AI and the Conquest of Complexity in Law
The paper identi es some of the problems with legal systems and outlines the potential of AI technology for overcoming them. For expository purposes, this outline is based on a si...
L. Bibel
JSS
2000
85views more  JSS 2000»
13 years 8 months ago
An experimental comparison of reading techniques for defect detection in UML design documents
The basic motivation for software inspections is to detect and remove defects before they propagate to subsequent development phases where their detection and removal becomes more...
Oliver Laitenberger, Colin Atkinson, Maud Schlich,...