Sciweavers

482 search results - page 80 / 97
» Predicting failures with developer networks and social netwo...
Sort
View
VL
2008
IEEE
133views Visual Languages» more  VL 2008»
14 years 2 months ago
Analyzing a socio-technical visualization tool using usability inspection methods
Ariadne is a novel visualization tool that allows end users to explore the socio-technical relationships in software development projects. Essentially the visualization is a varia...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
BMCBI
2005
102views more  BMCBI 2005»
13 years 7 months ago
Genome-wide identification of the regulatory targets of a transcription factor using biochemical characterization and computatio
Background: A major challenge in computational genomics is the development of methodologies that allow accurate genome-wide prediction of the regulatory targets of a transcription...
Emmitt R. Jolly, Chen-Shan Chin, Ira Herskowitz, H...
BMCBI
2008
100views more  BMCBI 2008»
13 years 7 months ago
Hotspot Hunter: a computational system for large-scale screening and selection of candidate immunological hotspots in pathogen p
Background: T-cell epitopes that promiscuously bind to multiple alleles of a human leukocyte antigen (HLA) supertype are prime targets for development of vaccines and immunotherap...
Guanglan Zhang, Asif M. Khan, Kellathur N. Sriniva...
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
AIMS
2007
Springer
14 years 1 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings