Sciweavers

1759 search results - page 307 / 352
» Overview of Generative Software Development
Sort
View
115
Voted
BMCBI
2006
167views more  BMCBI 2006»
15 years 17 days ago
GOurmet: A tool for quantitative comparison and visualization of gene expression profiles based on gene ontology (GO) distributi
Background: The ever-expanding population of gene expression profiles (EPs) from specified cells and tissues under a variety of experimental conditions is an important but difficu...
Jason M. Doherty, Lynn K. Carmichael, Jason C. Mil...
106
Voted
BMCBI
2004
139views more  BMCBI 2004»
15 years 11 days ago
mlstdbNet - distributed multi-locus sequence typing (MLST) databases
Background: Multi-locus sequence typing (MLST) is a method of typing that facilitates the discrimination of microbial isolates by comparing the sequences of housekeeping gene frag...
Keith A. Jolley, Man-Suen Chan, Martin C. J. Maide...
124
Voted
BMCBI
2004
96views more  BMCBI 2004»
15 years 11 days ago
Identification of regions in multiple sequence alignments thermodynamically suitable for targeting by consensus oligonucleotides
Background: Computer programs for the generation of multiple sequence alignments such as "Clustal W" allow detection of regions that are most conserved among many sequen...
Olga V. Matveeva, Brian T. Foley, Vladimir A. Nemt...
143
Voted
BMCBI
2010
185views more  BMCBI 2010»
14 years 7 months ago
MetaPIGA v2.0: maximum likelihood large phylogeny estimation using the metapopulation genetic algorithm and other stochastic heu
Background: The development, in the last decade, of stochastic heuristics implemented in robust application softwares has made large phylogeny inference a key step in most compara...
Raphaël Helaers, Michel C. Milinkovitch
159
Voted
JIPS
2010
195views more  JIPS 2010»
14 years 7 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa