Sciweavers

1545 search results - page 308 / 309
» Information Systems Success Revisited
Sort
View
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 9 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
ECIS
2001
13 years 8 months ago
Data Modelling Languages: An Ontological Study
There are many data modelling languages used in today's information systems engineering environment. Some of the data modelling languages used have a degree of hype surroundi...
Simon K. Milton, Edmund Kazmierczak, Chris Keen
BMCBI
2008
126views more  BMCBI 2008»
13 years 7 months ago
Combining Shapley value and statistics to the analysis of gene expression data in children exposed to air pollution
Background: In gene expression analysis, statistical tests for differential gene expression provide lists of candidate genes having, individually, a sufficiently low p-value. Howe...
Stefano Moretti, Danitsja van Leeuwen, Hans Gmuend...
BMCBI
2006
174views more  BMCBI 2006»
13 years 7 months ago
Genome wide prediction of protein function via a generic knowledge discovery approach based on evidence integration
Background: The automation of many common molecular biology techniques has resulted in the accumulation of vast quantities of experimental data. One of the major challenges now fa...
Jianghui Xiong, Simon Rayner, Kunyi Luo, Yinghui L...