Sciweavers

5722 search results - page 242 / 1145
» Security Function Interactions
Sort
View
BMCBI
2006
181views more  BMCBI 2006»
15 years 3 months ago
Array2BIO: from microarray expression data to functional annotation of co-regulated genes
Background: There are several isolated tools for partial analysis of microarray expression data. To provide an integrative, easy-to-use and automated toolkit for the analysis of A...
Gabriela G. Loots, Patrick S. G. Chain, Shalini Ma...
PUC
2006
81views more  PUC 2006»
15 years 3 months ago
Social functions of location in mobile telephony
Location appears to be one of the most important aspects of context in mobile communication. It is a complex piece of information involving several levels of detail. Location inter...
Ilkka Arminen
JASIS
2007
101views more  JASIS 2007»
15 years 3 months ago
Mining Web functional dependencies for flexible information access
We present an approach to enhancing information access through web structure mining in contrast to traditional approaches involving usage mining. Specifically, we mine the hardwi...
Saverio Perugini, Naren Ramakrishnan
TCS
1998
15 years 2 months ago
Axiomatisation of Functional Dependencies in Incomplete Relations
Incomplete relations are relations which contain null values, whose meaning is \value is at present unknown". Such relations give rise to two types of functional dependency (...
Mark Levene, George Loizou
SIAMREV
2010
170views more  SIAMREV 2010»
14 years 9 months ago
Network Properties Revealed through Matrix Functions
The newly emerging field of Network Science deals with the tasks of modelling, comparing and summarizing large data sets that describe complex interactions. Because pairwise affin...
Ernesto Estrada, Desmond J. Higham