Sciweavers

6293 search results - page 327 / 1259
» Information Flow Testing
Sort
View
146
Voted
BMCBI
2008
138views more  BMCBI 2008»
15 years 4 months ago
Using neural networks and evolutionary information in decoy discrimination for protein tertiary structure prediction
Background: We present a novel method of protein fold decoy discrimination using machine learning, more specifically using neural networks. Here, decoy discrimination is represent...
Ching-Wai Tan, David T. Jones
KRMED
2008
15 years 6 months ago
Essential SNOMED: Simplifying SNOMED-CT and supporting Integration with Health Information Models
SNOMED CT (SCT) has been designed and implemented in an era when health computer systems generally required terminology representations in the form of singular precoordinated conc...
Peter MacIsaac, Donald Walker, Rachel L. Richesson...
EGOV
2003
Springer
15 years 10 months ago
Local Democracy Shaping e-Democracy
This paper offers a fresh perspective to study the role and implications of information and communications technologies (ICT) in processes of local democracy. It moves away from ea...
Zahid Parvez
CAISE
2007
Springer
15 years 8 months ago
Deciding to Adopt Requirements Traceability in Practice
The use of requirements traceability for information systems development (ISD) projects is not very common in practice despite its often mentioned advantages in the literature. We ...
Floris Blaauboer, Klaas Sikkel, Mehmet N. Aydin
CSFW
2008
IEEE
15 years 6 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers