Sciweavers

776 search results - page 138 / 156
» Conceptual Patterns for Reuse in Information Systems Analysi...
Sort
View
110
Voted
NRHM
2000
149views more  NRHM 2000»
15 years 6 days ago
Navigable history: a reader's view of writer's time
Collecting, analyzing, and sharing information via a hypertext results in the continuous modification of information content over a long period of time. Such tasks will benefit fr...
Frank M. Shipman III, Hao-wei Hsieh
BMCBI
2005
122views more  BMCBI 2005»
15 years 10 days ago
FACT - a framework for the functional interpretation of high-throughput experiments
Background: Interpreting the results of high-throughput experiments, such as those obtained from DNA-microarrays, is an often time-consuming task due to the high number of data-po...
Felix Kokocinski, Nicolas Delhomme, Gunnar Wrobel,...
PLDI
2004
ACM
15 years 5 months ago
Parametric regular path queries
Regular path queries are a way of declaratively expressing queries on graphs as regular-expression-like patterns that are matched against paths in the graph. There are two kinds o...
Yanhong A. Liu, Tom Rothamel, Fuxiang Yu, Scott D....
103
Voted
CHI
2009
ACM
16 years 1 months ago
Exploring video streams using slit-tear visualizations
Slit-tear visualizations allow users to selectively visualize pixel paths in a video scene. The slit-tear visualization technique is a generalization of the traditional photograph...
Anthony Tang, Saul Greenberg, Sidney Fels
137
Voted
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 10 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau