Sciweavers

848 search results - page 149 / 170
» Understanding Obfuscated Code
Sort
View
BMCBI
2006
161views more  BMCBI 2006»
13 years 7 months ago
Comparative genomics in cyprinids: common carp ESTs help the annotation of the zebrafish genome
Background: Automatic annotation of sequenced eukaryotic genomes integrates a combination of methodologies such as ab-initio methods and alignment of homologous genes and/or prote...
Alan Christoffels, Richard Bartfai, Hamsa Srinivas...
GEOINFORMATICA
2007
148views more  GEOINFORMATICA 2007»
13 years 7 months ago
Assessing the Certainty of Locations Produced by an Address Geocoding System
Addresses are the most common georeferencing resource people use to communicate to others a location within a city. Urban GIS applications that receive data directly fromcitizens,...
Clodoveu A. Davis, Frederico T. Fonseca
JSS
2007
115views more  JSS 2007»
13 years 7 months ago
A case study in re-engineering to enforce architectural control flow and data sharing
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
AAMAS
2002
Springer
13 years 7 months ago
Adapting Populations of Agents
We control a population of interacting software agents. The agents have a strategy, and receive a payoff for executing that strategy. Unsuccessful agents become extinct. We investi...
Philippe De Wilde, Maria Chli, Luís Correia...
NAR
2002
138views more  NAR 2002»
13 years 7 months ago
The KEGG databases at GenomeNet
The Kyoto Encyclopedia of Genes and Genomes (KEGG) is the primary database resource of the Japanese GenomeNet service (http://www.genome.ad.jp/) for understanding higher order fun...
Minoru Kanehisa, Susumu Goto, Shuichi Kawashima, A...