Sciweavers

1055 search results - page 198 / 211
» Direct learning of LPV controllers from data
Sort
View
CIKM
1997
Springer
15 years 1 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...
BMCBI
2005
125views more  BMCBI 2005»
14 years 9 months ago
A simple approach for protein name identification: prospects and limits
Background: Significant parts of biological knowledge are available only as unstructured text in articles of biomedical journals. By automatically identifying gene and gene produc...
Katrin Fundel, Daniel Güttler, Ralf Zimmer, J...
BMCBI
2006
249views more  BMCBI 2006»
14 years 9 months ago
Gene functional similarity search tool (GFSST)
Background: With the completion of the genome sequences of human, mouse, and other species and the advent of high throughput functional genomic research technologies such as biomi...
Peisen Zhang, Jinghui Zhang, Huitao Sheng, James J...
BMCBI
2006
103views more  BMCBI 2006»
14 years 9 months ago
Probe-level linear model fitting and mixture modeling results in high accuracy detection of differential gene expression
Background: The identification of differentially expressed genes (DEGs) from Affymetrix GeneChips arrays is currently done by first computing expression levels from the low-level ...
Sébastien Lemieux
97
Voted
IJDE
2006
95views more  IJDE 2006»
14 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum