Sciweavers

524 search results - page 99 / 105
» Why phishing works
Sort
View
BMCBI
2007
86views more  BMCBI 2007»
13 years 9 months ago
Detecting microsatellites within genomes: significant variation among algorithms
Background: Microsatellites are short, tandemly-repeated DNA sequences which are widely distributed among genomes. Their structure, role and evolution can be analyzed based on exh...
Sébastien Leclercq, Eric Rivals, Philippe J...
EXPERT
2008
120views more  EXPERT 2008»
13 years 9 months ago
The CKC Challenge: Exploring Tools for Collaborative Knowledge Construction
The great success of Web 2.0 is mainly fuelled by an infrastructure that allows web users to create, share, tag, and connect content and knowledge easily. The tools for developing...
Natalya Fridman Noy, Abhita Chugh, Harith Alani
BMCBI
2006
106views more  BMCBI 2006»
13 years 9 months ago
Methodological study of affine transformations of gene expression data with proposed robust non-parametric multi-dimensional nor
Background: Low-level processing and normalization of microarray data are most important steps in microarray analysis, which have profound impact on downstream analysis. Multiple ...
Henrik Bengtsson, Ola Hössjer
COR
2006
138views more  COR 2006»
13 years 9 months ago
Deconstructing Nowicki and Smutnicki's i-TSAB tabu search algorithm for the job-shop scheduling problem
Over the last decade and a half, tabu search algorithms for machine scheduling have gained a near-mythical reputation by consistently equaling or establishing state-of-the-art per...
Jean-Paul Watson, Adele E. Howe, L. Darrell Whitle...
ENTCS
2006
168views more  ENTCS 2006»
13 years 9 months ago
A Functional Programming Framework for Latency Insensitive Protocol Validation
Latency insensitive protocols (LIPs) have been proposed as a viable means to connect synchronous IP blocks via long interconnects in a system-on-chip. The reason why one needs to ...
Syed Suhaib, Deepak Mathaikutty, Sandeep K. Shukla...