Sciweavers

2597 search results - page 514 / 520
» A Relational Approach to Support Software Architecture Analy...
Sort
View
IJSNET
2008
118views more  IJSNET 2008»
14 years 9 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
84
Voted
BMCBI
2006
146views more  BMCBI 2006»
14 years 9 months ago
GeneTools - application for functional annotation and statistical hypothesis testing
Background: Modern biology has shifted from "one gene" approaches to methods for genomic-scale analysis like microarray technology, which allow simultaneous measurement ...
Vidar Beisvag, Frode K. R. Jünge, Hallgeir Be...
DOCENG
2006
ACM
15 years 3 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
SIGGRAPH
1998
ACM
15 years 1 months ago
Non-distorted Texture Mapping for Sheared Triangulated Meshes
This article introduces new techniques for non-distorted texture mapping on complex triangulated meshes. Texture coordinates are assigned to the vertices of the triangulation by u...
Bruno Lévy, Jean-Laurent Mallet
BMCBI
2008
118views more  BMCBI 2008»
14 years 9 months ago
Evaluation of phylogenetic footprint discovery for predicting bacterial cis-regulatory elements and revealing their evolution
Background: The detection of conserved motifs in promoters of orthologous genes (phylogenetic footprints) has become a common strategy to predict cis-acting regulatory elements. S...
Rekin's Janky, Jacques van Helden