Sciweavers

2421 search results - page 261 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BMCBI
2008
143views more  BMCBI 2008»
15 years 4 months ago
Automatic detection of exonic splicing enhancers (ESEs) using SVMs
Background: Exonic splicing enhancers (ESEs) activate nearby splice sites and promote the inclusion (vs. exclusion) of exons in which they reside, while being a binding site for S...
Britta Mersch, Alexander Gepperth, Sándor S...
BMCBI
2008
178views more  BMCBI 2008»
15 years 4 months ago
Identification of coherent patterns in gene expression data using an efficient biclustering algorithm and parallel coordinate vi
Background: The DNA microarray technology allows the measurement of expression levels of thousands of genes under tens/hundreds of different conditions. In microarray data, genes ...
Kin-On Cheng, Ngai-Fong Law, Wan-Chi Siu, Alan Wee...
MATES
2004
Springer
15 years 10 months ago
Developing Tools for Agent-Oriented Visual Modeling
Most of the Agent-Oriented software engineering methodologies that have been developed in the last years tend to propose a model-based approach to software development. To be put i...
Anna Perini, Angelo Susi
148
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
Adding Capacity Points to a Wireless Mesh Network Using Local Search
Abstract— Wireless mesh network deployments are popular as a cost-effective means to provide broadband connectivity to large user populations. As the network usage grows, network...
Joshua Robinson, Mustafa Uysal, Ram Swaminathan, E...
DAC
2010
ACM
15 years 4 months ago
Instruction cache locking using temporal reuse profile
The performance of most embedded systems is critically dependent on the average memory access latency. Improving the cache hit rate can have significant positive impact on the per...
Yun Liang, Tulika Mitra