Sciweavers

1825 search results - page 364 / 365
» Cryptographic Securities Exchanges
Sort
View
BMCBI
2010
132views more  BMCBI 2010»
13 years 6 months ago
Next generation tools for genomic data generation, distribution, and visualization
Background: With the rapidly falling cost and availability of high throughput sequencing and microarray technologies, the bottleneck for effectively using genomic analysis in the ...
David A. Nix, Tonya L. Di Sera, Brian K. Dalley, B...
BMCBI
2008
99views more  BMCBI 2008»
13 years 6 months ago
CWRML: representing crop wild relative conservation and use data in XML
Background: Crop wild relatives are wild species that are closely related to crops. They are valuable as potential gene donors for crop improvement and may help to ensure food sec...
Jonathan D. Moore, Shelagh P. Kell, Jose M. Iriond...
AHSWN
2006
206views more  AHSWN 2006»
13 years 6 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
GRID
2006
Springer
13 years 6 months ago
Labs of the World, Unite!!!
: eScience is rapidly changing the way we do research. As a result, many research labs now need non-trivial computational power. Grid and voluntary computing are well-established s...
Walfredo Cirne, Francisco Vilar Brasileiro, Nazare...
JOT
2008
142views more  JOT 2008»
13 years 6 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon