Sciweavers

2863 search results - page 541 / 573
» Constructing minimum-interference networks
Sort
View
CCS
2010
ACM
15 years 1 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
FPGA
2010
ACM
232views FPGA» more  FPGA 2010»
15 years 1 months ago
High-throughput bayesian computing machine with reconfigurable hardware
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Mingjie Lin, Ilia Lebedev, John Wawrzynek
BMCBI
2010
109views more  BMCBI 2010»
15 years 1 months ago
Application of machine learning methods to histone methylation ChIP-Seq data reveals H4R3me2 globally represses gene expression
Background: In the last decade, biochemical studies have revealed that epigenetic modifications including histone modifications, histone variants and DNA methylation form a comple...
Xiaojiang Xu, Stephen Hoang, Marty W. Mayo, Stefan...
BMCBI
2010
240views more  BMCBI 2010»
15 years 1 months ago
CircuitsDB: a database of mixed microRNA/transcription factor feed-forward regulatory circuits in human and mouse
Background: Transcription Factors (TFs) and microRNAs (miRNAs) are key players for gene expression regulation in higher eukaryotes. In the last years, a large amount of bioinforma...
Olivier Friard, Angela Re, Daniela Taverna, Michel...
BMCBI
2008
120views more  BMCBI 2008»
15 years 1 months ago
A protein interaction based model for schizophrenia study
Background: Schizophrenia is a complex disease with multiple factors contributing to its pathogenesis. In addition to environmental factors, genetic factors may also increase susc...
Pei-Chun Hsu, Ueng-Cheng Yang, Kuan-Hui Shih, Chih...