Sciweavers

1964 search results - page 359 / 393
» An analysis of extensible modelling for functional genomics ...
Sort
View
BMCBI
2010
141views more  BMCBI 2010»
14 years 9 months ago
Computing and visually analyzing mutual information in molecular co-evolution
Background: Selective pressure in molecular evolution leads to uneven distributions of amino acids and nucleotides. In fact one observes correlations among such constituents due t...
Sebastian Bremm, Tobias Schreck, Patrick Boba, Ste...
70
Voted
SIGIR
2005
ACM
15 years 3 months ago
Relevance weighting for query independent evidence
A query independent feature, relating perhaps to document content, linkage or usage, can be transformed into a static, per-document relevance weight for use in ranking. The challe...
Nick Craswell, Stephen E. Robertson, Hugo Zaragoza...
77
Voted
CHI
2004
ACM
15 years 10 months ago
Breaking the book: translating the chemistry lab book into a pervasive computing lab environment
The UK e-Science programme is relying on the evolution of the paper lab book into a pervasive data gathering lab system. To date take up of existing commercial or research lab boo...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
ICST
2009
IEEE
15 years 4 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya