Sciweavers

2312 search results - page 411 / 463
» From Effect to Effectiveness: The Missing Research Questions
Sort
View
WORM
2004
15 years 19 days ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
BMCBI
2008
94views more  BMCBI 2008»
14 years 11 months ago
Conserved co-expression for candidate disease gene prioritization
Background: Genes that are co-expressed tend to be involved in the same biological process. However, co-expression is not a very reliable predictor of functional links between gen...
Martin Oti, Jeroen van Reeuwijk, Martijn A. Huynen...
BMCBI
2006
117views more  BMCBI 2006»
14 years 11 months ago
G-InforBIO: integrated system for microbial genomics
Background: Genome databases contain diverse kinds of information, including gene annotations and nucleotide and amino acid sequences. It is not easy to integrate such information...
Naoto Tanaka, Takashi Abe, Satoru Miyazaki, Hideak...
JUCS
2006
141views more  JUCS 2006»
14 years 11 months ago
Constraint Based Methods for Biological Sequence Analysis
: The need for processing biological information is rapidly growing, owing to the masses of new information in digital form being produced at this time. Old methodologies for proce...
Maryam Bavarian, Verónica Dahl
AAMAS
1999
Springer
14 years 11 months ago
Fully Embodied Conversational Avatars: Making Communicative Behaviors Autonomous
: Although avatars may resemble communicative interface agents, they have for the most part not profited from recent research into autonomous embodied conversational systems. In pa...
Justine Cassell, Hannes Högni Vilhjálm...