Sciweavers

4296 search results - page 847 / 860
» Knowledge Management and Collaboration
Sort
View
MOBICOM
2010
ACM
14 years 12 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
14 years 12 months ago
Expressive and flexible access to web-extracted data: a keyword-based structured query language
Automated extraction of structured data from Web sources often leads to large heterogeneous knowledge bases (KB), with data and schema items numbering in the hundreds of thousands...
Jeffrey Pound, Ihab F. Ilyas, Grant E. Weddell
BMCBI
2010
138views more  BMCBI 2010»
14 years 12 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
BMCBI
2010
98views more  BMCBI 2010»
14 years 12 months ago
Resolving anaphoras for the extraction of drug-drug interactions in pharmacological documents
Background: Drug-drug interactions are frequently reported in the increasing amount of biomedical literature. Information Extraction (IE) techniques have been devised as a useful ...
Isabel Segura-Bedmar, Mario Crespo, César d...
BMCBI
2008
122views more  BMCBI 2008»
14 years 12 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...