Sciweavers

8825 search results - page 1287 / 1765
» All for one or one for all
Sort
View
108
Voted
BMCBI
2005
100views more  BMCBI 2005»
15 years 1 months ago
Evolutionary models for insertions and deletions in a probabilistic modeling framework
Background: Probabilistic models for sequence comparison (such as hidden Markov models and pair hidden Markov models for proteins and mRNAs, or their context-free grammar counterp...
Elena Rivas
122
Voted
BMCBI
2005
106views more  BMCBI 2005»
15 years 1 months ago
ESTree db: a Tool for Peach Functional Genomics
Background: The ESTree db http://www.itb.cnr.it/estree/ represents a collection of Prunus persica expressed sequenced tags (ESTs) and is intended as a resource for peach functiona...
Barbara Lazzari, Andrea Caprera, Alberto Vecchiett...
AIM
2002
15 years 1 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
CI
2004
119views more  CI 2004»
15 years 1 months ago
Reasoning with Sets of Defaults in Default Logic
We present a general approach for representing and reasoning with sets of defaults in default logic, focussing on reasoning about preferences among sets of defaults. First, we con...
James P. Delgrande, Torsten Schaub
CN
2004
122views more  CN 2004»
15 years 1 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
« Prev « First page 1287 / 1765 Last » Next »