Sciweavers

1486 search results - page 291 / 298
» Firewall Rules Analysis
Sort
View
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
15 years 9 months ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
BMCBI
2010
162views more  BMCBI 2010»
14 years 9 months ago
Moara: a Java library for extracting and normalizing gene and protein mentions
Background: Gene/protein recognition and normalization are important preliminary steps for many biological text mining tasks, such as information retrieval, protein-protein intera...
Mariana L. Neves, José María Carazo,...
BMCBI
2010
98views more  BMCBI 2010»
14 years 9 months ago
Resolving anaphoras for the extraction of drug-drug interactions in pharmacological documents
Background: Drug-drug interactions are frequently reported in the increasing amount of biomedical literature. Information Extraction (IE) techniques have been devised as a useful ...
Isabel Segura-Bedmar, Mario Crespo, César d...
BMCBI
2007
109views more  BMCBI 2007»
14 years 9 months ago
A domain-based approach to predict protein-protein interactions
Background: Knowing which proteins exist in a certain organism or cell type and how these proteins interact with each other are necessary for the understanding of biological proce...
Mudita Singhal, Haluk Resat
BMCBI
2010
178views more  BMCBI 2010»
14 years 9 months ago
Applications of a formal approach to decipher discrete genetic networks
Background: A growing demand for tools to assist the building and analysis of biological networks exists in systems biology. We argue that the use of a formal approach is relevant...
Fabien Corblin, Eric Fanchon, Laurent Trilling