Sciweavers

5948 search results - page 1100 / 1190
» Computing Robust Counter-Strategies
Sort
View
WSC
2004
14 years 11 months ago
Data Farming Coevolutionary Dynamics in RePast
This paper describes the application of data farming techniques (Brandstein and Horne 1998) to explore various aspects of coevolutionary dynamics (McKelvey 2002) in organization s...
Brian F. Tivnan
WSCG
2004
242views more  WSCG 2004»
14 years 11 months ago
Hand Gesture Recognition for Human-Machine Interaction
Even after more than two decades of input devices development, many people still find the interaction with computers an uncomfortable experience. Efforts should be made to adapt c...
Elena Sánchez-Nielsen, Luis Antón-Ca...
CONEXT
2009
ACM
14 years 11 months ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
BMCBI
2010
121views more  BMCBI 2010»
14 years 10 months ago
A Markov blanket-based method for detecting causal SNPs in GWAS
Background: Detecting epistatic interactions associated with complex and common diseases can help to improve prevention, diagnosis and treatment of these diseases. With the develo...
Bing Han, Meeyoung Park, Xue-wen Chen
BMCBI
2008
176views more  BMCBI 2008»
14 years 10 months ago
H2r: Identification of evolutionary important residues by means of an entropy based analysis of multiple sequence alignments
Background: A multiple sequence alignment (MSA) generated for a protein can be used to characterise residues by means of a statistical analysis of single columns. In addition to t...
Rainer Merkl, Matthias Zwick
« Prev « First page 1100 / 1190 Last » Next »