Sciweavers

1369 search results - page 245 / 274
» A Practical Implementation of the Timing Attack
Sort
View
BMCBI
2010
175views more  BMCBI 2010»
14 years 11 months ago
Calibur: a tool for clustering large numbers of protein decoys
Background: Ab initio protein structure prediction methods generate numerous structural candidates, which are referred to as decoys. The decoy with the most number of neighbors of...
Shuai Cheng Li, Yen Kaow Ng
BMCBI
2010
118views more  BMCBI 2010»
14 years 11 months ago
svdPPCS: an effective singular value decomposition-based method for conserved and divergent co-expression gene module identifica
Background: Comparative analysis of gene expression profiling of multiple biological categories, such as different species of organisms or different kinds of tissue, promises to e...
Wensheng Zhang, Andrea Edwards, Wei Fan, Dongxiao ...
CORR
2007
Springer
151views Education» more  CORR 2007»
14 years 10 months ago
Decision tree modeling with relational views
Data mining is a useful decision support technique that can be used to discover production rules in warehouses or corporate data. Data mining research has made much effort to appl...
Fadila Bentayeb, Jérôme Darmont
IEPOL
2010
102views more  IEPOL 2010»
14 years 9 months ago
An antitrust analysis of the case for wireless network neutrality
The ongoing debate about possible implementation of regulatory rules requiring “network neutrality” for wireless telecommunications services is inherently about whether to imp...
Gregory L. Rosston, Michael D. Topper
REPLICATION
2010
14 years 9 months ago
A History of the Virtual Synchrony Replication Model
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Ken Birman