Sciweavers

861 search results - page 166 / 173
» Predicting Attack-prone Components
Sort
View
BMCBI
2006
118views more  BMCBI 2006»
13 years 7 months ago
Statistical analysis of an RNA titration series evaluates microarray precision and sensitivity on a whole-array basis
Background: Concerns are often raised about the accuracy of microarray technologies and the degree of cross-platform agreement, but there are yet no methods which can unambiguousl...
Andrew J. Holloway, Alicia Oshlack, Dileepa S. Diy...
BMCBI
2007
155views more  BMCBI 2007»
13 years 7 months ago
ProCMD: a database and 3D web resource for protein C mutants
Background: Activated Protein C (ProC) is an anticoagulant plasma serine protease which also plays an important role in controlling inflammation and cell proliferation. Several mu...
Pasqualina D'Ursi, Francesca Marino, Andrea Caprer...
JAIR
2008
103views more  JAIR 2008»
13 years 7 months ago
SATzilla: Portfolio-based Algorithm Selection for SAT
It has been widely observed that there is no single "dominant" SAT solver; instead, different solvers perform best on different instances. Rather than following the trad...
Lin Xu, Frank Hutter, Holger H. Hoos, Kevin Leyton...
JMLR
2008
127views more  JMLR 2008»
13 years 7 months ago
Incremental Identification of Qualitative Models of Biological Systems using Inductive Logic Programming
The use of computational models is increasingly expected to play an important role in predicting the behaviour of biological systems. Models are being sought at different scales o...
Ashwin Srinivasan, Ross D. King
JSA
2008
91views more  JSA 2008»
13 years 7 months ago
Using supplier locality in power-aware interconnects and caches in chip multiprocessors
Conventional snoopy-based chip multiprocessors take an aggressive approach broadcasting snoop requests to all nodes. In addition each node checks all received requests. This appro...
Ehsan Atoofian, Amirali Baniasadi