Sciweavers

2648 search results - page 420 / 530
» Human Factors In Computer Security
Sort
View
RECOMB
2009
Springer
15 years 10 months ago
Storage and Retrieval of Individual Genomes
A repetitive sequence collection is one where portions of a base sequence of length n are repeated many times with small variations, forming a collection of total length N. Example...
Gonzalo Navarro, Jouni Sirén, Niko Väl...
GROUP
2003
ACM
15 years 3 months ago
Technology for boundaries
This paper presents a study of an organisation, which is undergoing a process transforming organisational and technological boundaries. In particular, we shall look at three kinds...
Susanne Bødker, Jannie Friis Kristensen, Ch...
BMCBI
2008
169views more  BMCBI 2008»
14 years 10 months ago
CompMoby: Comparative MobyDick for detection of cis-regulatory motifs
Background: The regulation of gene expression is complex and occurs at many levels, including transcriptional and post-transcriptional, in metazoans. Transcriptional regulation is...
Christina Chaivorapol, Collin Melton, Grace Wei, R...
DAC
2006
ACM
15 years 11 months ago
SMERT: energy-efficient design of a multimedia messaging system for mobile devices
Customized multimedia content delivery has become one of the most desirable applications to mobile device users. However its intense usage of wireless and user interfaces poses a ...
Lin Zhong, Bin Wei, Michael J. Sinclair
SIGSOFT
2005
ACM
15 years 10 months ago
Combining self-reported and automatic data to improve programming effort measurement
Measuring effort accurately and consistently across subjects in a programming experiment can be a surprisingly difficult task. In particular, measures based on self-reported data ...
Lorin Hochstein, Victor R. Basili, Marvin V. Zelko...