Sciweavers

3303 search results - page 647 / 661
» Multidimensional Access Methods
Sort
View
88
Voted
BMCBI
2006
155views more  BMCBI 2006»
15 years 26 days ago
CAVER: a new tool to explore routes from protein clefts, pockets and cavities
Background: The main aim of this study was to develop and implement an algorithm for the rapid, accurate and automated identification of paths leading from buried protein clefts, ...
Martin Petrek, Michal Otyepka, Pavel Banás,...
130
Voted
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 25 days ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai
89
Voted
BMCBI
2007
123views more  BMCBI 2007»
15 years 25 days ago
BIRCH: A user-oriented, locally-customizable, bioinformatics system
Background: Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be ...
Brian Fristensky
93
Voted
CGF
2007
99views more  CGF 2007»
15 years 24 days ago
Layered Performance Animation with Correlation Maps
Performance has a spontaneity and “aliveness” that can be difficult to capture in more methodical animation processes such as keyframing. Access to performance animation has ...
Michael Neff, Irene Albrecht, Hans-Peter Seidel
84
Voted
IEEESP
2006
108views more  IEEESP 2006»
15 years 24 days ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven