Sciweavers

943 search results - page 145 / 189
» Simulation based deadlock analysis for system level designs
Sort
View
DIWEB
2001
13 years 10 months ago
Converting XML Data To UML Diagrams For Conceptual Data Integration
The demand for data integration is rapidly becoming larger as more and more information sources appear in modern enterprises. In many situations a logical (rather than physical) i...
Mikael R. Jensen, Thomas H. Møller, Torben ...
BMCBI
2008
99views more  BMCBI 2008»
13 years 9 months ago
Exhaustive prediction of disease susceptibility to coding base changes in the human genome
Background: Single Nucleotide Polymorphisms (SNPs) are the most abundant form of genomic variation and can cause phenotypic differences between individuals, including diseases. Ba...
Vinayak Kulkarni, Mounir Errami, Robert Barber, Ha...
BMCBI
2011
13 years 3 months ago
Sequential Interim Analyses of Survival Data in DNA Microarray Experiments
Background: Discovery of biomarkers that are correlated with therapy response and thus with survival is an important goal of medical research on severe diseases, e.g. cancer. Freq...
Andreas Leha, Tim Beißbarth, Klaus Jung
CIKM
2007
Springer
14 years 3 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
CSE
2009
IEEE
14 years 3 months ago
Modelling of Pseudonymity under Probabilistic Linkability Attacks
—This paper contributes to the field of measuring (un)linkability in communication systems; a subproblem of privacy protection. We propose an attacker state model for attacks on...
Martin Neubauer