Sciweavers

297 search results - page 55 / 60
» Heap Reference Analysis Using Access Graphs
Sort
View
113
Voted
BMCBI
2007
200views more  BMCBI 2007»
14 years 12 months ago
BNDB - The Biochemical Network Database
Background: Technological advances in high-throughput techniques and efficient data acquisition methods have resulted in a massive amount of life science data. The data is stored ...
Jan Küntzer, Christina Backes, Torsten Blum, ...
VTC
2007
IEEE
105views Communications» more  VTC 2007»
15 years 6 months ago
Random Beamforming OFDMA for Future Generation Cellular Communication Systems
—This paper presents a downlink performance analysis of a Layered Random Beamforming (LRB) - MIMO-OFDMA Physical Layer (PHY) as applicable to future generation wireless communica...
Congzheng Han, Angela Doufexi, Simon Armour, Joe M...
CCS
2006
ACM
15 years 3 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
NAR
2008
138views more  NAR 2008»
14 years 11 months ago
TarO: a target optimisation system for structural biology
TarO (http://www.compbio.dundee.ac.uk/taro) offers a single point of reference for key bioinformatics analyses relevant to selecting proteins or domains for study by structural bi...
Ian M. Overton, C. A. Johannes van Niekerk, Lester...
BMCBI
2008
111views more  BMCBI 2008»
14 years 12 months ago
Probabilistic base calling of Solexa sequencing data
Background: Solexa/Illumina short-read ultra-high throughput DNA sequencing technology produces millions of short tags (up to 36 bases) by parallel sequencing-by-synthesis of DNA ...
Jacques Rougemont, Arnaud Amzallag, Christian Isel...