Sciweavers

16844 search results - page 3338 / 3369
» How to Design Programs
Sort
View
TII
2008
77views more  TII 2008»
13 years 10 months ago
The One-Shot Task Model for Robust Real-Time Embedded Control Systems
Embedded control systems are often implemented in small microprocessors enabled with real-time technology. In this context, control laws are often designed according to discrete-ti...
Camilo Lozoya, Manel Velasco, Pau Martí
BMCBI
2005
121views more  BMCBI 2005»
13 years 10 months ago
Automated methods of predicting the function of biological sequences using GO and BLAST
Background: With the exponential increase in genomic sequence data there is a need to develop automated approaches to deducing the biological functions of novel sequences with hig...
Craig E. Jones, Ute Baumann, Alfred L. Brown
BMCBI
2005
116views more  BMCBI 2005»
13 years 10 months ago
Can Zipf's law be adapted to normalize microarrays?
Background: Normalization is the process of removing non-biological sources of variation between array experiments. Recent investigations of data in gene expression databases for ...
Timothy Lu, Christine M. Costello, Peter J. P. Cro...
BMCBI
2005
157views more  BMCBI 2005»
13 years 10 months ago
Decision Forest Analysis of 61 Single Nucleotide Polymorphisms in a Case-Control Study of Esophageal Cancer; a novel method
Background: Systematic evaluation and study of single nucleotide polymorphisms (SNPs) made possible by high throughput genotyping technologies and bioinformatics promises to provi...
Qian Xie, Luke D. Ratnasinghe, Huixiao Hong, Roger...
CACM
2005
74views more  CACM 2005»
13 years 10 months ago
Separate handles from names on the internet
Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. ...
Michael J. O'Donnell
« Prev « First page 3338 / 3369 Last » Next »