Sciweavers

271 search results - page 36 / 55
» Free Open Source Software Development: Recent Research Resul...
Sort
View
80
Voted
CCS
2007
ACM
15 years 3 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
FLAIRS
2008
14 years 11 months ago
A First-Order Bayesian Tool for Probabilistic Ontologies
One of the major weaknesses of current research on the Semantic Web (SW) is the lack of proper means to represent and reason with uncertainty. A number of recent efforts from the ...
Paulo Cesar G. da Costa, Marcelo Ladeira, Rommel N...
NAR
2010
123views more  NAR 2010»
14 years 4 months ago
Xenbase: gene expression and improved integration
Xenbase (www.xenbase.org), the model organism database for Xenopus laevis and X. (Silurana) tropicalis, is the principal centralized resource of genomic, development data and comm...
Jeff B. Bowes, Kevin A. Snyder, Erik Segerdell, Ch...
BMCBI
2002
120views more  BMCBI 2002»
14 years 9 months ago
tacg - a grep for DNA
Background: Pattern matching is the core of bioinformatics; it is used in database searching, restriction enzyme mapping, and finding open reading frames. It is done repeatedly ov...
Harry Mangalam
ISBI
2006
IEEE
15 years 10 months ago
An evaluation of three approaches to tetrahedral mesh generation for deformable registration of brain MR images
In this paper we evaluate three conceptually different approaches to mesh generation for deformable Finite Element Method (FEM) registration of Magnetic Resonance (MR) images of b...
Andriy Fedorov, Nikos Chrisochoides, Ron Kikinis, ...