Sciweavers

117 search results - page 17 / 24
» Analysis of Long Branch Extraction
Sort
View
BMCBI
2010
86views more  BMCBI 2010»
14 years 9 months ago
Mining protein loops using a structural alphabet and statistical exceptionality
Background: Protein loops encompass 50% of protein residues in available three-dimensional structures. These regions are often involved in protein functions, e.g. binding site, ca...
Leslie Regad, Juliette Martin, Grégory Nuel...
BMCBI
2010
108views more  BMCBI 2010»
14 years 9 months ago
Error, reproducibility and sensitivity : a pipeline for data processing of Agilent oligonucleotide expression arrays
Background: Expression microarrays are increasingly used to obtain large scale transcriptomic information on a wide range of biological samples. Nevertheless, there is still much ...
Benjamin Chain, Helen Bowen, John Hammond, Wilfrie...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 4 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
ICHIM
2001
116views more  ICHIM 2001»
14 years 10 months ago
MauroTeX - A Language for Electronic Critical Editions
MauroTeX, an extension of the wellknown LaTeX typesetting system, is a language designed in order to completely describe philological critical editions of ancient mathematical and...
Paolo Mascellani, Pier Daniele Napoletani
ICPR
2002
IEEE
15 years 10 months ago
Structure from Motion from Three Affine Views
We describe a new method for Structure From Motion from three affine views. The central idea of the method is to explore the intrinsic three-view properties instead of previous tw...
Long Quan, Maxime Lhuillier