Sciweavers

4636 search results - page 690 / 928
» Modelling and Validation with VipTool
Sort
View
CSREASAM
2006
13 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
AMC
2007
92views more  AMC 2007»
13 years 9 months ago
An integrated framework for continuous assessment and improvement of manufacturing systems
This paper presents an integrated framework for assessment and ranking of manufacturing systems based on management and organizational performance indicators. The integrated appro...
Ali Azadeh, S. F. Ghaderi, Y. Partovi Miran, V. Eb...
BMCBI
2008
121views more  BMCBI 2008»
13 years 9 months ago
Modularization of biochemical networks based on classification of Petri net t-invariants
Background: Structural analysis of biochemical networks is a growing field in bioinformatics and systems biology. The availability of an increasing amount of biological data from ...
Eva Grafahrend-Belau, Falk Schreiber, Monika Heine...
BMCBI
2006
124views more  BMCBI 2006»
13 years 9 months ago
Detection of divergent genes in microbial aCGH experiments
Background: Array-based comparative genome hybridization (aCGH) is a tool for rapid comparison of genomes from different bacterial strains. The purpose of such analysis is to dete...
Lars Snipen, Dirk Repsilber, Ludvig Nyquist, &Arin...
BMCBI
2006
114views more  BMCBI 2006»
13 years 9 months ago
Epigenetic acquisition of inducibility of type III cytotoxicity in P. aeruginosa
Background: Pseudomonas aeruginosa, an opportunistic pathogen, is often encountered in chronic lung diseases such as cystic fibrosis or chronic obstructive pneumonia, as well as a...
Didier Filopon, Annabelle Mérieau, Gilles B...