Sciweavers

11973 search results - page 2367 / 2395
» Methods for organizational development
Sort
View
CN
1999
128views more  CN 1999»
13 years 10 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
JCB
1998
129views more  JCB 1998»
13 years 10 months ago
A Sticker-Based Model for DNA Computation
We introduce a new model of molecular computation that we call the sticker model. Like many previous proposals it makes use of DNA strands as the physical substrate in which infor...
Sam T. Roweis, Erik Winfree, Richard Burgoyne, Nic...
JUCS
2002
231views more  JUCS 2002»
13 years 10 months ago
Efficient Content-Based and Metadata Retrieval in Image Database
: Managing image data in a database system using metadata has been practiced since the last two decades. However, describing an image fully and adequately with metadata is practica...
Solomon Atnafu, Richard Chbeir, Lionel Brunie
NAR
2002
138views more  NAR 2002»
13 years 10 months ago
The KEGG databases at GenomeNet
The Kyoto Encyclopedia of Genes and Genomes (KEGG) is the primary database resource of the Japanese GenomeNet service (http://www.genome.ad.jp/) for understanding higher order fun...
Minoru Kanehisa, Susumu Goto, Shuichi Kawashima, A...
TC
1998
13 years 10 months ago
Methodologies for Tolerating Cell and Interconnect Faults in FPGAs
—The very high levels of integration and submicron device sizes used in current and emerging VLSI technologies for FPGAs lead to higher occurrences of defects and operational fau...
Fran Hanchek, Shantanu Dutt
« Prev « First page 2367 / 2395 Last » Next »