Sciweavers

3614 search results - page 717 / 723
» Numerical Computing with MATLAB
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 9 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 8 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
BMCBI
2010
97views more  BMCBI 2010»
13 years 8 months ago
Preprocessing of gene expression data by optimally robust estimators
Background: The preprocessing of gene expression data obtained from several platforms routinely includes the aggregation of multiple raw signal intensities to one expression value...
Matthias Kohl, Hans-Peter Deigner
FUIN
2010
136views more  FUIN 2010»
13 years 8 months ago
Modeling Biology using Generic Reactive Animation
Abstract. Complex biological systems involve incorporated behaviors of numerous processes, mechanisms and objects. However, experimental analysis, by its nature, divides biological...
Yaki Setty, Irun R. Cohen, David Harel
BMCBI
2011
13 years 6 months ago
R2R - software to speed the depiction of aesthetic consensus RNA secondary structures
Background: With continuing identification of novel structured noncoding RNAs, there is an increasing need to create schematic diagrams showing the consensus features of these mol...
Zasha Weinberg, Ronald R. Breaker