Sciweavers

36320 search results - page 6982 / 7264
» From Code to Models
Sort
View
142
Voted
JIB
2006
78views more  JIB 2006»
15 years 4 months ago
Prediction of transcription factor binding to DNA using rule induction methods
In this study, we seek to develop a predictive model for finding the strength of binding between a particular transcription factor (TF) variant and a particular DNA target variant...
Mikael Huss, Karin Nordström
LOGCOM
2008
94views more  LOGCOM 2008»
15 years 4 months ago
Preservation of Interpolation Features by Fibring
Fibring is a metalogical constructor that permits to combine different logics by operating on their deductive systems under certain natural restrictions, as for example that the t...
Walter Alexandre Carnielli, João Rasga, Cri...
JPDC
2006
253views more  JPDC 2006»
15 years 4 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
MANSCI
2006
119views more  MANSCI 2006»
15 years 4 months ago
Supply Chain Choice on the Internet
Internet companies extensively use the practice of drop-shipping, where the wholesaler stocks and owns the inventory and ships products directly to customers at retailers' re...
Serguei Netessine, Nils Rudi
NAR
2006
177views more  NAR 2006»
15 years 4 months ago
PUMA2 - grid-based high-throughput analysis of genomes and metabolic pathways
The PUMA2 system (available at http://compbio.mcs. 10 anl.gov/puma2) is an interactive, integrated bioinformatics environment for high-throughput genetic sequence analysis and met...
Natalia Maltsev, Elizabeth M. Glass, Dinanath Sula...
« Prev « First page 6982 / 7264 Last » Next »