Sciweavers

18697 search results - page 3720 / 3740
» Systemic Security Management
Sort
View
148
Voted
BMCBI
2006
154views more  BMCBI 2006»
15 years 3 months ago
Automated recognition of malignancy mentions in biomedical literature
Background: The rapid proliferation of biomedical text makes it increasingly difficult for researchers to identify, synthesize, and utilize developed knowledge in their fields of ...
Yang Jin, Ryan T. McDonald, Kevin Lerman, Mark A. ...
BMCBI
2007
166views more  BMCBI 2007»
15 years 3 months ago
Data handling strategies for high throughput pyrosequencers
Background: New high throughput pyrosequencers such as the 454 Life Sciences GS 20 are capable of massively parallelizing DNA sequencing providing an unprecedented rate of output ...
Gabriele A. Trombetti, Raoul J. P. Bonnal, Ermanno...
128
Voted
CORR
2007
Springer
135views Education» more  CORR 2007»
15 years 3 months ago
AMIEDoT: An annotation model for document tracking and recommendation service
The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on inf...
Charles A. Robert
128
Voted
CORR
2007
Springer
146views Education» more  CORR 2007»
15 years 3 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...
179
Voted
JOT
2008
445views more  JOT 2008»
15 years 3 months ago
From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)
The purpose of this article is to provide a brief insight about how to link your business vision, goals, strategies, tactics as well as business rules according to BMM, then bridg...
Birol Berkem
« Prev « First page 3720 / 3740 Last » Next »