Sciweavers

2945 search results - page 586 / 589
» Designing and Implementing Malicious Hardware
Sort
View
BMCBI
2005
131views more  BMCBI 2005»
14 years 9 months ago
Critical evaluation of the JDO API for the persistence and portability requirements of complex biological databases
Background: Complex biological database systems have become key computational tools used daily by scientists and researchers. Many of these systems must be capable of executing on...
Marko Srdanovic, Ulf Schenk, Michael Schwieger, Fa...
BMCBI
2005
246views more  BMCBI 2005»
14 years 9 months ago
ParPEST: a pipeline for EST data analysis based on parallel computing
Background: Expressed Sequence Tags (ESTs) are short and error-prone DNA sequences generated from the 5' and 3' ends of randomly selected cDNA clones. They provide an im...
Nunzio D'Agostino, Mario Aversano, Maria Luisa Chi...
JCIT
2007
192views more  JCIT 2007»
14 years 9 months ago
Action Representation for Natural Language Interfaces to Agent Systems
In this paper, we outline a framework for the development of natural language interfaces to agent systems with a focus on action representation. The architecture comprises a natur...
Christel Kemke
TROB
2008
107views more  TROB 2008»
14 years 9 months ago
Templates and Anchors for Antenna-Based Wall Following in Cockroaches and Robots
The interplay between robotics and neuromechanics facilitates discoveries in both fields: nature provides roboticists with design ideas, while robotics research elucidates critical...
J. Lee, S. N. Sponberg, Owen Y. Loh, Andrew G. Lam...
COMPUTER
1998
131views more  COMPUTER 1998»
14 years 9 months ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa