Sciweavers

3303 search results - page 647 / 661
» Multidimensional Access Methods
Sort
View
BMCBI
2006
155views more  BMCBI 2006»
13 years 10 months ago
CAVER: a new tool to explore routes from protein clefts, pockets and cavities
Background: The main aim of this study was to develop and implement an algorithm for the rapid, accurate and automated identification of paths leading from buried protein clefts, ...
Martin Petrek, Michal Otyepka, Pavel Banás,...
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 10 months ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai
BMCBI
2007
123views more  BMCBI 2007»
13 years 10 months ago
BIRCH: A user-oriented, locally-customizable, bioinformatics system
Background: Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be ...
Brian Fristensky
CGF
2007
99views more  CGF 2007»
13 years 10 months ago
Layered Performance Animation with Correlation Maps
Performance has a spontaneity and “aliveness” that can be difficult to capture in more methodical animation processes such as keyframing. Access to performance animation has ...
Michael Neff, Irene Albrecht, Hans-Peter Seidel
IEEESP
2006
108views more  IEEESP 2006»
13 years 10 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven