Sciweavers

6047 search results - page 1090 / 1210
» Modeling with Extend
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 1 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
SMA
2008
ACM
149views Solid Modeling» more  SMA 2008»
15 years 1 months ago
Exact arrangements on tori and Dupin cyclides
An algorithm and implementation is presented to compute the exact arrangement induced by arbitrary algebraic surfaces on a parametrized ring Dupin cyclide. The family of Dupin cyc...
Eric Berberich, Michael Kerber
BMCBI
2005
89views more  BMCBI 2005»
15 years 1 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg
JCST
2007
151views more  JCST 2007»
15 years 1 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng
124
Voted
BMCBI
2004
114views more  BMCBI 2004»
15 years 1 months ago
HMM Logos for visualization of protein families
Background: Profile Hidden Markov Models (pHMMs) are a widely used tool for protein family research. Up to now, however, there exists no method to visualize all of their central a...
Benjamin Schuster-Böckler, Jörg Schultz,...
« Prev « First page 1090 / 1210 Last » Next »