Sciweavers

1834 search results - page 366 / 367
» Public Key Cryptography
Sort
View
BMCBI
2011
12 years 11 months ago
A hierarchical Bayesian network approach for linkage disequilibrium modeling and data-dimensionality reduction prior to genome-w
Background: Discovering the genetic basis of common genetic diseases in the human genome represents a public health issue. However, the dimensionality of the genetic data (up to 1...
Raphael Mourad, Christine Sinoquet, Philippe Leray
CIDR
2011
243views Algorithms» more  CIDR 2011»
12 years 11 months ago
Longitudinal Analytics on Web Archive Data: It's About Time!
Organizations like the Internet Archive have been capturing Web contents over decades, building up huge repositories of time-versioned pages. The timestamp annotations and the she...
Gerhard Weikum, Nikos Ntarmos, Marc Spaniol, Peter...
JCDL
2011
ACM
272views Education» more  JCDL 2011»
12 years 10 months ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
NAR
2011
233views Computer Vision» more  NAR 2011»
12 years 10 months ago
ArachnoServer 2.0, an updated online resource for spider toxin sequences and structures
ArachnoServer (www.arachnoserver.org) is a manually curated database providing information on the sequence, structure and biological activity of protein toxins from spider venoms....
Volker Herzig, David L. A. Wood, Felicity Newell, ...
HRI
2012
ACM
12 years 3 months ago
Designing persuasive robots: how robots might persuade people using vocal and nonverbal cues
Social robots have to potential to serve as personal, organizational, and public assistants as, for instance, diet coaches, teacher’s aides, and emergency respondents. The succe...
Vijay Chidambaram, Yueh-Hsuan Chiang, Bilge Mutlu