Sciweavers

733 search results - page 117 / 147
» Private inference control
Sort
View
RECOMB
2006
Springer
14 years 8 months ago
Structural Alignment of Pseudoknotted RNA
In this paper, we address the problem of discovering novel non-coding RNA (ncRNA) using primary sequence, and secondary structure conservation, focusing on ncRNA families with pseu...
Banu Dost, Buhm Han, Shaojie Zhang, Vineet Bafna
SIGMOD
2005
ACM
177views Database» more  SIGMOD 2005»
14 years 7 months ago
An approach for pipelining nested collections in scientific workflows
We describe an approach for pipelining nested data collections in scientific workflows. Our approach logically delimits arbitrarily nested collections of data tokens using special...
Timothy M. McPhillips, Shawn Bowers
CHI
2010
ACM
14 years 2 months ago
Making policy decisions disappear into the user's workflow
: © Making Policy Decisions Disappear into the User's Workflow Alan H. Karp, Marc Stiegler HP Laboratories HPL-2009-341 Usable security Complaints of security interfering wit...
Alan H. Karp, Marc Stiegler
BIBE
2007
IEEE
132views Bioinformatics» more  BIBE 2007»
14 years 2 months ago
Morphometric Analysis of Hippocampal Shape in Mild Cognitive Impairment: An Imaging Genetics Study
—A computational framework is presented for surface based morphometry to localize shape changes between groups of 3D objects. It employs the spherical harmonic (SPHARM) method fo...
Li Shen, Andrew J. Saykin, Moo K. Chung, Heng Huan...
GLOBECOM
2007
IEEE
14 years 2 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...