Sciweavers

1555 search results - page 284 / 311
» When the implication is not to design (technology)
Sort
View
CIKM
2006
Springer
15 years 3 months ago
Multi-evidence, multi-criteria, lazy associative document classification
We present a novel approach for classifying documents that combines different pieces of evidence (e.g., textual features of documents, links, and citations) transparently, through...
Adriano Veloso, Wagner Meira Jr., Marco Cristo, Ma...
DRM
2006
Springer
15 years 3 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
BPSC
2009
184views Business» more  BPSC 2009»
15 years 28 days ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
BMCBI
2010
95views more  BMCBI 2010»
14 years 12 months ago
An effective approach for identification of in vivo protein-DNA binding sites from paired-end ChIP-Seq data
Background: ChIP-Seq, which combines chromatin immunoprecipitation (ChIP) with high-throughput massively parallel sequencing, is increasingly being used for identification of prot...
Congmao Wang, Jie Xu, Dasheng Zhang, Zoe A. Wilson...
BMCBI
2007
239views more  BMCBI 2007»
14 years 12 months ago
Pre-processing Agilent microarray data
Background: Pre-processing methods for two-sample long oligonucleotide arrays, specifically the Agilent technology, have not been extensively studied. The goal of this study is to...
Marianna Zahurak, Giovanni Parmigiani, Wayne Yu, R...