Sciweavers

897 search results - page 65 / 180
» Identity: How to name it, How to find it
Sort
View
IJKL
2007
68views more  IJKL 2007»
15 years 1 months ago
Modelling the creation of value from intellectual capital: a Portuguese banking perspective
: Despite the widely recognised importance of intellectual capital as a vital source of competitive advantage, there is still little understanding of how organisations actually com...
Maria do Rosário Cabrita, Jorge Landeiro De...
CIKM
2008
Springer
15 years 3 months ago
Fast mining of complex time-stamped events
Given a collection of complex, time-stamped events, how do we find patterns and anomalies? Events could be meetings with one or more persons with one or more agenda items at zero ...
Hanghang Tong, Yasushi Sakurai, Tina Eliassi-Rad, ...
95
Voted
BMCBI
2008
95views more  BMCBI 2008»
15 years 1 months ago
Gene set analyses for interpreting microarray experiments on prokaryotic organisms
Background: Despite the widespread usage of DNA microarrays, questions remain about how best to interpret the wealth of gene-by-gene transcriptional levels that they measure. Rece...
Nathan L. Tintle, Aaron A. Best, Matthew DeJongh, ...
BMCBI
2006
156views more  BMCBI 2006»
15 years 1 months ago
Detecting the limits of regulatory element conservation and divergence estimation using pairwise and multiple alignments
Background: Molecular evolutionary studies of noncoding sequences rely on multiple alignments. Yet how multiple alignment accuracy varies across sequence types, tree topologies, d...
Daniel A. Pollard, Alan M. Moses, Venky N. Iyer, M...
WWW
2006
ACM
16 years 2 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz