Background: High throughput methods of the genome era produce vast amounts of data in the form of gene lists. These lists are large and difficult to interpret without advanced com...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
This paper describes a highly mobile collaborative patient-centric, self-monitoring, symptom recognition and self intervention system along with a complementary clinical nursing t...
Social bookmarking tools become more and more popular nowadays and tagging is used to organize information and allow users to recall or search the resources. Users need to type th...
Background: Target identification is important for modern drug discovery. With the advances in the development of molecular docking, potential binding proteins may be discovered b...