Sciweavers

641 search results - page 91 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
ERCIMDL
2005
Springer
80views Education» more  ERCIMDL 2005»
14 years 2 months ago
Strategies for Reprocessing Aggregated Metadata
The OAI protocol facilitates the aggregation of large numbers of heterogeneous metadata records. In order to make harvested records useable in the context of an OAI service provide...
Muriel Foulonneau, Timothy W. Cole
BMCBI
2007
152views more  BMCBI 2007»
13 years 8 months ago
Difference-based clustering of short time-course microarray data with replicates
Background: There are some limitations associated with conventional clustering methods for short time-course gene expression data. The current algorithms require prior domain know...
Jihoon Kim, Ju Han Kim
JOT
2008
142views more  JOT 2008»
13 years 8 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon
ICST
2009
IEEE
14 years 3 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
BMCBI
2005
103views more  BMCBI 2005»
13 years 8 months ago
SeqDoC: rapid SNP and mutation detection by direct comparison of DNA sequence chromatograms
Background: This paper describes SeqDoC, a simple, web-based tool to carry out direct comparison of ABI sequence chromatograms. This allows the rapid identification of single nucl...
Mark L. Crowe