Sciweavers

2877 search results - page 167 / 576
» Biological Computing
Sort
View
97
Voted
ASM
2010
ASM
15 years 6 days ago
Applying the B Method for the Rigorous Development of Smart Card Applications
Abstract. Smart Card applications usually require reliability and security to avoid incorrect operation or access violation in transactions and corruption or undue access to stored...
Bruno Emerson Gurgel Gomes, David Déharbe, ...
ISMB
1997
14 years 11 months ago
Automated Alignment of RNA Sequences to Pseudoknotted Structures
Seq7 is a newprogramfor generating multiple structure-based alignments of RNAsequences. Byusing a variant of Dijkstra’s algorithm to find the shortest path through a specially c...
Jack E. Tabaska, Gary D. Stormo
ISMB
1996
14 years 11 months ago
Parameterization Studies for the SAM and HMMER Methods of Hidden Markov Model Generation
Multiple sequence alignment of distantly related viral proteins remains a challenge to all currently available alignment methods. The hidden Markovmodel approach offers a new,flex...
Marcella A. McClure, Chris Smith, Pete Elton
65
Voted
ISMB
1994
14 years 11 months ago
Knowledge Discovery of Multilevel Protein Motifs
A new category of protein motif is introduced. This type of motif captures, in addition to global structure, the nested structure of its componentparts. Adata.set of four proteins...
Darrell Conklin, Suzanne Fortier, Janice I. Glasgo...
73
Voted
ISMB
1994
14 years 11 months ago
A Restriction Mapping Engine Using Constraint Logic Programming
Restrictionmappinggenerallyrequires the applicationof information from various digestions by restriction enzymesto find solution sets. Weuse boththe predicate calculusandconstrain...
Trevor I. Dix, Chut N. Yee