Sciweavers

3555 search results - page 578 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
BMCBI
2007
168views more  BMCBI 2007»
15 years 1 months ago
GOSim - an R-package for computation of information theoretic GO similarities between terms and gene products
Background: With the increased availability of high throughput data, such as DNA microarray data, researchers are capable of producing large amounts of biological data. During the...
Holger Fröhlich, Nora Speer, Annemarie Poustk...
BMCBI
2006
125views more  BMCBI 2006»
15 years 1 months ago
Automated functional classification of experimental and predicted protein structures
Background: Proteins that are similar in sequence or structure may perform different functions in nature. In such cases, function cannot be inferred from sequence or structural si...
Kai Wang, Ram Samudrala
APLAS
2006
ACM
15 years 7 months ago
Scheme with Classes, Mixins, and Traits
Abstract. The Scheme language report advocates language design as the composition of a small set of orthogonal constructs, instead of a large accumulation of features. In this pape...
Matthew Flatt, Robert Bruce Findler, Matthias Fell...
112
Voted
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
13 years 4 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
APSCC
2008
IEEE
15 years 8 months ago
Analysis of Context-Aware Network Selection Schemes for Power Savings
Socio-technical developments in computing have resulted in the emergence of innovative mobile systems which exploit the information available on the Internet to optimize the perfo...
Pravin Pawar, Bert-Jan van Beijnum, Hermie Hermens...