Sciweavers

21430 search results - page 4035 / 4286
» Abstract Effective Models
Sort
View
IMCS
2007
77views more  IMCS 2007»
15 years 4 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
157
Voted
ASE
2005
124views more  ASE 2005»
15 years 4 months ago
Reuse-Conducive Development Environments
Despite its well-recognized benefits, software reuse has not met its expected success due to technical, cognitive, and social difficulties. We have systematically analyzed the reu...
Yunwen Ye, Gerhard Fischer
TIFS
2008
148views more  TIFS 2008»
15 years 4 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
BMCBI
2005
123views more  BMCBI 2005»
15 years 4 months ago
PSI-BLAST-ISS: an intermediate sequence search tool for estimation of the position-specific alignment reliability
Background: Protein sequence alignments have become indispensable for virtually any evolutionary, structural or functional study involving proteins. Modern sequence search and com...
Mindaugas Margelevicius, Ceslovas Venclovas
BMCBI
2005
122views more  BMCBI 2005»
15 years 4 months ago
A neural strategy for the inference of SH3 domain-peptide interaction specificity
Background: The SH3 domain family is one of the most representative and widely studied cases of so-called Peptide Recognition Modules (PRM). The polyproline II motif PxxP that gen...
Enrico Ferraro, Allegra Via, Gabriele Ausiello, Ma...
« Prev « First page 4035 / 4286 Last » Next »