Sciweavers

1018 search results - page 202 / 204
» Remote User Authentication Using Public Information
Sort
View
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 5 months ago
Comparing Repository Types - Challenges and barriers for subject-based repositories, research repositories, national repository
After two decades of repository development, some conclusions may be drawn as to which type of repository and what kind of service best supports digital scholarly communication, a...
Chris Armbruster, Laurent Romary
CSB
2005
IEEE
210views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Problem Solving Environment Approach to Integrating Diverse Biological Data Sources
Scientists face an ever-increasing challenge in investigating biological systems with high throughput experimental methods such as mass spectrometry and gene arrays because of the...
Eric G. Stephan, Kyle R. Klicker, Mudita Singhal, ...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
BIODATAMINING
2008
117views more  BIODATAMINING 2008»
13 years 7 months ago
Search extension transforms Wiki into a relational system: A case for flavonoid metabolite database
Background: In computer science, database systems are based on the relational model founded by Edgar Codd in 1970. On the other hand, in the area of biology the word 'databas...
Masanori Arita, Kazuhiro Suwa
BMCBI
2008
136views more  BMCBI 2008»
13 years 7 months ago
GPAT: Retrieval of genomic annotation from large genomic position datasets
Background: Recent genome wide transcription factor binding site or chromatin modification mapping analysis techniques, such as chromatin immunoprecipitation (ChIP) linked to DNA ...
Arnaud Krebs, Mattia Frontini, Làszlò...