Sciweavers

BMCBI
2010
106views more  BMCBI 2010»
12 years 11 months ago
Identification and correction of previously unreported spatial phenomena using raw Illumina BeadArray data
Background: A key stage for all microarray analyses is the extraction of feature-intensities from an image. If this step goes wrong, then subsequent preprocessing and processing s...
Mike L. Smith, Mark J. Dunning, Simon Tavaré...
BMCBI
2010
193views more  BMCBI 2010»
12 years 11 months ago
Mayday - integrative analytics for expression data
Background: DNA Microarrays have become the standard method for large scale analyses of gene expression and epigenomics. The increasing complexity and inherent noisiness of the ge...
Florian Battke, Stephan Symons, Kay Nieselt
BIS
2010
159views Business» more  BIS 2010»
12 years 11 months ago
Comparing Intended and Real Usage in Web Portal: Temporal Logic and Data Mining
Nowadays the software systems, including web portals, are developed from a priori assumptions about how the system will be used. However, frequently these assumptions hold only par...
Jérémy Besson, Ieva Mitasiunaite, Au...
ADVSE
2010
103views more  ADVSE 2010»
12 years 11 months ago
Extending Conceptual Schemas with Business Process Information
Abstract. The specification of business processes is becoming a more and more critical aspect for organizations. Such processes are specified as workflow models expressing the logi...
Marco Brambilla, Jordi Cabot, Sara Comai
BPSC
2010
285views Business» more  BPSC 2010»
13 years 1 months ago
Crossing the Chasm Between the Real World and Business Process Management
Abstract: While agility is a core challenge in today's competitive business, softwarebased business process modeling and execution approaches often refer to strict and inflexi...
Markus Schief, Benedikt Schmidt
BISE
2010
221views more  BISE 2010»
13 years 1 months ago
Explanatory Design Theory
Richard Baskerville, Jan Pries-Heje
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 1 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
IANDC
2010
107views more  IANDC 2010»
13 years 1 months ago
Equational properties of iterative monads
Iterative monads of Calvin Elgot were introduced to treat the semantics of recursive equations purely algebraically. They are Lawvere theories with the property that all ideal sys...
Jirí Adámek, Stefan Milius, Jiri Vel...
IANDC
2010
160views more  IANDC 2010»
13 years 1 months ago
Coequational logic for accessible functors
Covarieties of coalgebras are those classes of coalgebras for an endofunctor H on the category of sets that are closed under coproducts, subcoalgebras and quotients. Equivalently,...
Daniel Schwencke
IANDC
2010
125views more  IANDC 2010»
13 years 1 months ago
A thread calculus with molecular dynamics
In a previous paper, we developed an algebraic theory of threads, interleaving of threads, and interaction between threads and services. In the current paper, we extend that theory...
Jan A. Bergstra, C. A. Middelburg