Sciweavers

755 search results - page 144 / 151
» Visualizing Java in Action
Sort
View
IFIP
2001
Springer
14 years 2 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
INAP
2001
Springer
14 years 2 months ago
iML: A Logic-based Framework for Constructing Graphical User Interface on Mobile Agents
Mobile agent technology is an emerging technology that allows easier design, implementation, and maintenance of distributed systems. Mobility enables agents to reduce network load,...
Naoki Fukuta, Nobuaki Mizutani, Tadachika Ozono, T...
RE
2001
Springer
14 years 2 months ago
The Single Model Principle
at different levels of abstraction. There are two very different ways of using such languages. One approach is based on the manifestation of a single model, with construction of di...
Richard F. Paige, Jonathan S. Ostroff
BMCBI
2007
79views more  BMCBI 2007»
13 years 9 months ago
Orthology prediction at scalable resolution by phylogenetic tree analysis
Background: Orthology is one of the cornerstones of gene function prediction. Dividing the phylogenetic relations between genes into either orthologs or paralogs is however an ove...
René T. J. M. van der Heijden, Berend Snel,...
BMCBI
2006
109views more  BMCBI 2006»
13 years 9 months ago
iHOPerator: user-scripting a personalized bioinformatics Web, starting with the iHOP website
Background: User-scripts are programs stored in Web browsers that can manipulate the content of websites prior to display in the browser. They provide a novel mechanism by which u...
Benjamin M. Good, Edward A. Kawas, Byron Yu-Lin Ku...