Sciweavers

12637 search results - page 2334 / 2528
» Security for Extensible Systems
Sort
View
136
Voted
AES
2007
Springer
75views Cryptology» more  AES 2007»
15 years 5 months ago
Improved FVM for two-layer shallow-water models: Application to the Strait of Gibraltar
This paper deals with the numerical simulation of flows of stratified fluids through channels with irregular geometry. Channel crosssections are supposed to be symmetric but no...
Manuel Jose Castro Díaz, José A. Gar...
BMCBI
2008
95views more  BMCBI 2008»
15 years 5 months ago
Mining protein networks for synthetic genetic interactions
Background: The local connectivity and global position of a protein in a protein interaction network are known to correlate with some of its functional properties, including its e...
Sri R. Paladugu, Shan Zhao, Animesh Ray, Alpan Rav...
BMCBI
2008
149views more  BMCBI 2008»
15 years 5 months ago
All-paths graph kernel for protein-protein interaction extraction with evaluation of cross-corpus learning
Background: Automated extraction of protein-protein interactions (PPI) is an important and widely studied task in biomedical text mining. We propose a graph kernel based approach ...
Antti Airola, Sampo Pyysalo, Jari Björne, Tap...
144
Voted
IJPP
2006
145views more  IJPP 2006»
15 years 5 months ago
Deterministic Parallel Processing
Abstract. In order to address the problems faced in the wireless communications domain, picoChip has devised the picoArrayTM . The picoArrayTM is a tiled-processor architecture, co...
Gajinder Panesar, Daniel Towner, Andrew Duller, Al...
JODL
2006
136views more  JODL 2006»
15 years 5 months ago
MIT's CWSpace project: packaging metadata for archiving educational content in DSpace
This paper describes work in progress on the research project CWSpace, sponsored by the MIT and Microsoft Research iCampus program, to investigate the metadata standards and protoc...
William Reilly, Robert Wolfe, MacKenzie Smith
« Prev « First page 2334 / 2528 Last » Next »