Sciweavers

390 search results - page 65 / 78
» The Factors that Affect the Implementation Success of IS
Sort
View
CGO
2006
IEEE
14 years 2 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
BMCBI
2010
134views more  BMCBI 2010»
13 years 8 months ago
R-Gada: a fast and flexible pipeline for copy number analysis in association studies
Background: Genome-wide association studies (GWAS) using Copy Number Variation (CNV) are becoming a central focus of genetic research. CNVs have successfully provided target genom...
Roger Pique-Regi, Alejandro Cáceres, Juan R...
SIGSOFT
1996
ACM
14 years 24 days ago
Tool Support for Planning the Restructuring of Data Abstractions in Large Systems
Abstractions in Large Systems William G. Griswold, Member, IEEE, Morison I. Chen, Robert W. Bowdidge, Jenny L. Cabaniss, Van B. Nguyen, and J. David Morgenthaler Restructuring soft...
William G. Griswold, Morison I. Chen, Robert W. Bo...
BMCBI
2006
100views more  BMCBI 2006»
13 years 8 months ago
Empirical array quality weights in the analysis of microarray data
Background: Assessment of array quality is an essential step in the analysis of data from microarray experiments. Once detected, less reliable arrays are typically excluded or &qu...
Matthew E. Ritchie, Dileepa S. Diyagama, Jody Neil...
OCLC
2008
86views more  OCLC 2008»
13 years 8 months ago
Those who don't look don't find: disciplinary considerations in repository advocacy
Purpose of this paper By describing some of the often ignored aspects of repository advocacy, such as disciplinary differences and how these might affect the adoption of a particu...
Danny Kingsley