Sciweavers

1532 search results - page 237 / 307
» A Comparison of RESTART Implementations
Sort
View
BMCBI
2006
101views more  BMCBI 2006»
14 years 10 months ago
Predicting residue contacts using pragmatic correlated mutations method: reducing the false positives
Background: Predicting residues' contacts using primary amino acid sequence alone is an important task that can guide 3D structure modeling and can verify the quality of the ...
Petras J. Kundrotas, Emil Alexov
CANDC
2006
ACM
14 years 10 months ago
Detecting and aligning peaks in mass spectrometry data with applications to MALDI
In this paper, we address the peak detection and alignment problem in the analysis of mass spectrometry data. To deal with the peak redundancy problem existing in the MALDI data a...
Weichuan Yu, Baolin Wu, Ning Lin, Kathy Stone, Ken...
CN
2006
99views more  CN 2006»
14 years 10 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
CORR
2006
Springer
140views Education» more  CORR 2006»
14 years 10 months ago
A Vortex Method for Bi-phasic Fluids Interacting with Rigid Bodies
We present an accurate Lagrangian method based on vortex particles, level-sets, and immersed boundary methods, for animating the interplay between two fluids and rigid solids. We ...
Mathieu Coquerelle, Jérémie Allard, ...
IJNSEC
2008
106views more  IJNSEC 2008»
14 years 9 months ago
Parallel Hardware Architectures for the Cryptographic Tate Pairing
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...