Sciweavers

21319 search results - page 4064 / 4264
» An Approach for Method Reengineering
Sort
View
RAID
2010
Springer
15 years 2 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
TCBB
2010
106views more  TCBB 2010»
15 years 2 months ago
Predicting Novel Human Gene Ontology Annotations Using Semantic Analysis
—The correct interpretation of many molecular biology experiments depends in an essential way on the accuracy and consistency of the existing annotation databases. Such databases...
Bogdan Done, Purvesh Khatri, Arina Done, Sorin Dra...
WABI
2010
Springer
128views Bioinformatics» more  WABI 2010»
15 years 2 months ago
Sparsification of RNA Structure Prediction Including Pseudoknots
Background: Although many RNA molecules contain pseudoknots, computational prediction of pseudoknotted RNA structure is still in its infancy due to high running time and space con...
Mathias Möhl, Raheleh Salari, Sebastian Will,...
BIBM
2010
IEEE
144views Bioinformatics» more  BIBM 2010»
15 years 2 months ago
Identification and quantification of abundant species from pyrosequences of 16S rRNA by consensus alignment
16S rRNA gene profiling has recently been boosted by the development of pyrosequencing methods. A common analysis is to group pyrosequences into Operational Taxonomic Units (OTUs),...
Yuzhen Ye
BIBM
2010
IEEE
156views Bioinformatics» more  BIBM 2010»
15 years 2 months ago
Truncation of protein sequences for fast profile alignment with application to subcellular localization
We have recently found that the computation time of homology-based subcellular localization can be substantially reduced by aligning profiles up to the cleavage site positions of s...
Man-Wai Mak, Wei Wang, Sun-Yuan Kung
« Prev « First page 4064 / 4264 Last » Next »