Sciweavers

5122 search results - page 131 / 1025
» Comparing Consequence Relations
Sort
View
SOUPS
2010
ACM
15 years 7 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
BMCBI
2010
95views more  BMCBI 2010»
15 years 3 months ago
Modelling p-value distributions to improve theme-driven survival analysis of cancer transcriptome datasets
Background: Theme-driven cancer survival studies address whether the expression signature of genes related to a biological process can predict patient survival time. Although this...
Esteban Czwan, Benedikt Brors, David Kipling
121
Voted
BMCBI
2010
136views more  BMCBI 2010»
15 years 3 months ago
Bias correction and Bayesian analysis of aggregate counts in SAGE libraries
Background: Tag-based techniques, such as SAGE, are commonly used to sample the mRNA pool of an organism's transcriptome. Incomplete digestion during the tag formation proces...
Russell L. Zaretzki, Michael A. Gilchrist, William...
109
Voted
BMCBI
2010
118views more  BMCBI 2010»
15 years 3 months ago
Walk-weighted subsequence kernels for protein-protein interaction extraction
Background: The construction of interaction networks between proteins is central to understanding the underlying biological processes. However, since many useful relations are exc...
Seonho Kim, Juntae Yoon, Jihoon Yang, Seog Park
BMCBI
2007
129views more  BMCBI 2007»
15 years 3 months ago
A novel approach to sequence validating protein expression clones with automated decision making
Background: Whereas the molecular assembly of protein expression clones is readily automated and routinely accomplished in high throughput, sequence verification of these clones i...
Elena Taycher, Andreas Rolfs, Yanhui Hu, Dongmei Z...