Sciweavers

1407 search results - page 270 / 282
» The Use of Overloading in Java Programs
Sort
View
IFIP
2001
Springer
13 years 12 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
BMCBI
2007
136views more  BMCBI 2007»
13 years 7 months ago
Genomorama: genome visualization and analysis
Background: The ability to visualize genomic features and design experimental assays that can target specific regions of a genome is essential for modern biology. To assist in the...
Jason D. Gans, Murray Wolinsky
BMCBI
2006
130views more  BMCBI 2006»
13 years 7 months ago
4SALE - A tool for synchronous RNA sequence and secondary structure alignment and editing
Background: In sequence analysis the multiple alignment builds the fundament of all proceeding analyses. Errors in an alignment could strongly influence all succeeding analyses an...
Philipp N. Seibel, Tobias Müller, Thomas Dand...
TSC
2010
133views more  TSC 2010»
13 years 5 months ago
Semantic-Based Mashup of Composite Applications
—The need for integration of all types of client and server applications that were not initially designed to interoperate is gaining popularity. One of the reasons for this popul...
Anne H. H. Ngu, Michael Pierre Carlson, Quan Z. Sh...
ACMSE
2010
ACM
13 years 5 months ago
Visualization of the CreSIS Greenland data sets
The Center for Remote Sensing of Ice Sheets (CReSIS) has been compiling Greenland ice sheet thickness data since 1993. The airborne program utilizes a 150 MHz radar echo sounder to...
Shaketia L. McCoy, Michael Austin, Frensha Slaught...