Sciweavers

954 search results - page 183 / 191
» Principles and Models for Organizing the IT Function
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
CORR
2011
Springer
213views Education» more  CORR 2011»
14 years 11 months ago
Liquidsoap: a High-Level Programming Language for Multimedia Streaming
Generating multimedia streams, such as in a netradio, is a task which is complex and difficult to adapt to every users’ needs. We introduce a novel approach in order to achieve i...
David Baelde, Romain Beauxis, Samuel Mimram
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
16 years 4 months ago
QoX-driven ETL design: reducing the cost of ETL consulting engagements
As business intelligence becomes increasingly essential for organizations and as it evolves from strategic to operational, the complexity of Extract-Transform-Load (ETL) processes...
Alkis Simitsis, Kevin Wilkinson, Malú Caste...
BIBM
2009
IEEE
155views Bioinformatics» more  BIBM 2009»
15 years 11 months ago
Towards Reliable Isoform Quantification Using RNA-Seq Data
Background: In eukaryotes, alternative splicing often generates multiple splice variants from a single gene. Here weexplore the use of RNA sequencing (RNA-Seq) datasets to address...
Brian E. Howard, Steffen Heber
ISBRA
2007
Springer
15 years 10 months ago
Reconstruction of 3D Structures from Protein Contact Maps
Proteins are large organic compounds made of amino acids arranged in a linear chain (primary structure). Most proteins fold into unique threedimensional (3D) structures called inte...
Marco Vassura, Luciano Margara, Filippo Medri, Pie...