Sciweavers

168 search results - page 25 / 34
» Ontology Change Detection Using a Version Log
Sort
View
BMCBI
2008
178views more  BMCBI 2008»
13 years 7 months ago
Identification of coherent patterns in gene expression data using an efficient biclustering algorithm and parallel coordinate vi
Background: The DNA microarray technology allows the measurement of expression levels of thousands of genes under tens/hundreds of different conditions. In microarray data, genes ...
Kin-On Cheng, Ngai-Fong Law, Wan-Chi Siu, Alan Wee...
BMCBI
2005
106views more  BMCBI 2005»
13 years 7 months ago
ESTree db: a Tool for Peach Functional Genomics
Background: The ESTree db http://www.itb.cnr.it/estree/ represents a collection of Prunus persica expressed sequenced tags (ESTs) and is intended as a resource for peach functiona...
Barbara Lazzari, Andrea Caprera, Alberto Vecchiett...
ICSE
2009
IEEE-ACM
14 years 8 months ago
How we refactor, and how we know it
Much of what we know about how programmers refactor in the wild is based on studies that examine just a few software projects. Researchers have rarely taken the time to replicate ...
Emerson R. Murphy-Hill, Chris Parnin, Andrew P. Bl...
MSR
2011
ACM
12 years 10 months ago
Modeling the evolution of topics in source code histories
Studying the evolution of topics (collections of co-occurring words) in a software project is an emerging technique to automatically shed light on how the project is changing over...
Stephen W. Thomas, Bram Adams, Ahmed E. Hassan, Do...
CSFW
2009
IEEE
14 years 2 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...