Sciweavers

796 search results - page 153 / 160
» Spoofing prevention method
Sort
View
BMCBI
2008
138views more  BMCBI 2008»
13 years 10 months ago
Automated simultaneous analysis phylogenetics (ASAP): an enabling tool for phlyogenomics
Background: The availability of sequences from whole genomes to reconstruct the tree of life has the potential to enable the development of phylogenomic hypotheses in ways that ha...
Indra Neil Sarkar, Mary G. Egan, Gloria M. Coruzzi...
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 10 months ago
An Evidential Path Logic for Multi-Relational Networks
Multi-relational networks are used extensively to structure knowledge. Perhaps the most popular instance, due to the widespread adoption of the Semantic Web, is the Resource Descr...
Marko A. Rodriguez, Joe Geldart
EJIS
2010
112views more  EJIS 2010»
13 years 10 months ago
Toward an 'IT Conflict-Resistance Theory': action research during IT pre-implementation
Most empirical research on users' resistance toward Information Technology (IT) has been conducted after implementation of IT in organisations. Little research has been done ...
Regis Meissonier, Emmanuel Houzé
AIS
2006
Springer
13 years 10 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
BMCBI
2006
137views more  BMCBI 2006»
13 years 9 months ago
Bounded search for de novo identification of degenerate cis-regulatory elements
Background: The identification of statistically overrepresented sequences in the upstream regions of coregulated genes should theoretically permit the identification of potential ...
Jonathan M. Carlson, Arijit Chakravarty, Radhika S...