Sciweavers

3272 search results - page 619 / 655
» Privacy in Data Publishing
Sort
View
USENIX
1993
13 years 10 months ago
HighLight: Using a Log-structured File System for Tertiary Storage Management
Robotic storage devices offer huge storage capacity at a low cost per byte, but with large access times. Integrating these devices into the storage hierarchy presents a challenge ...
John T. Kohl, Carl Staelin, Michael Stonebraker
CONEXT
2009
ACM
13 years 10 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
BMCBI
2010
160views more  BMCBI 2010»
13 years 9 months ago
Quantitative model for inferring dynamic regulation of the tumour suppressor gene p53
Background: The availability of various "omics" datasets creates a prospect of performing the study of genomewide genetic regulatory networks. However, one of the major ...
Junbai Wang, Tianhai Tian
BMCBI
2010
153views more  BMCBI 2010»
13 years 9 months ago
MimoSA: a system for minimotif annotation
Background: Minimotifs are short peptide sequences within one protein, which are recognized by other proteins or molecules. While there are now several minimotif databases, they a...
Jay Vyas, Ronald J. Nowling, Thomas Meusburger, Da...
BMCBI
2010
100views more  BMCBI 2010»
13 years 9 months ago
Scaffold filling, contig fusion and comparative gene order inference
Background: There has been a trend in increasing the phylogenetic scope of genome sequencing without finishing the sequence of the genome. Increasing numbers of genomes are being ...
Adriana Muñoz, Chunfang Zheng, Qian Zhu, Vi...