Sciweavers

1931 search results - page 384 / 387
» Why we blog
Sort
View
BMCBI
2005
152views more  BMCBI 2005»
13 years 9 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
JCP
2007
121views more  JCP 2007»
13 years 9 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
JIRS
1998
100views more  JIRS 1998»
13 years 9 months ago
Reactive Robots in the Service of Production Management
In this paper, we advocate the use of reactive robots in industrial process control and production management. It is explained why reactive robots are well-suited to modern industr...
Elpida Tzafestas
MICRO
2007
IEEE
113views Hardware» more  MICRO 2007»
13 years 9 months ago
The High Cost of a Cheap Lesson
y abstract, it is grounded in the experience of many markets. As I will illustrate, it explains much strategic behavior. Information spreads With a bit of effort, any technically s...
Shane Greenstein
IEEESP
2010
101views more  IEEESP 2010»
13 years 8 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato