Sciweavers

2763 search results - page 526 / 553
» The Dangerous 'All' in Specifications
Sort
View
VLSISP
2008
173views more  VLSISP 2008»
13 years 10 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
ASE
2004
137views more  ASE 2004»
13 years 10 months ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...
BMCBI
2004
117views more  BMCBI 2004»
13 years 10 months ago
CisOrtho: A program pipeline for genome-wide identification of transcription factor target genes using phylogenetic footprinting
Background: All known genomes code for a large number of transcription factors. It is important to develop methods that will reveal how these transcription factors act on a genome...
Henry R. Bigelow, Adam S. Wenick, Allan Wong, Oliv...
BMCBI
2004
96views more  BMCBI 2004»
13 years 10 months ago
Identification of regions in multiple sequence alignments thermodynamically suitable for targeting by consensus oligonucleotides
Background: Computer programs for the generation of multiple sequence alignments such as "Clustal W" allow detection of regions that are most conserved among many sequen...
Olga V. Matveeva, Brian T. Foley, Vladimir A. Nemt...
BMCBI
2004
117views more  BMCBI 2004»
13 years 10 months ago
Cancer characterization and feature set extraction by discriminative margin clustering
Background: A central challenge in the molecular diagnosis and treatment of cancer is to define a set of molecular features that, taken together, distinguish a given cancer, or ty...
Kamesh Munagala, Robert Tibshirani, Patrick O. Bro...