Sciweavers

11814 search results - page 2214 / 2363
» On Generalization by Neural Networks
Sort
View
WISEC
2010
ACM
15 years 4 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
FPGA
2010
ACM
232views FPGA» more  FPGA 2010»
15 years 4 months ago
High-throughput bayesian computing machine with reconfigurable hardware
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Mingjie Lin, Ilia Lebedev, John Wawrzynek
BMCBI
2010
160views more  BMCBI 2010»
15 years 4 months ago
Quantitative model for inferring dynamic regulation of the tumour suppressor gene p53
Background: The availability of various "omics" datasets creates a prospect of performing the study of genomewide genetic regulatory networks. However, one of the major ...
Junbai Wang, Tianhai Tian
BMCBI
2010
138views more  BMCBI 2010»
15 years 4 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
BMCBI
2010
149views more  BMCBI 2010»
15 years 4 months ago
KID - an algorithm for fast and efficient text mining used to automatically generate a database containing kinetic information o
Background: The amount of available biological information is rapidly increasing and the focus of biological research has moved from single components to networks and even larger ...
Stephanie Heinen, Bernhard Thielen, Dietmar Schomb...
« Prev « First page 2214 / 2363 Last » Next »