Sciweavers

963 search results - page 143 / 193
» Escape Analysis on Lists
Sort
View
NAR
2007
62views more  NAR 2007»
14 years 12 months ago
MolProbity: all-atom contacts and structure validation for proteins and nucleic acids
MolProbity is a general-purpose web server offering quality validation for 3D structures of proteins, nucleic acids and complexes. It provides detailed all-atom contact analysis o...
Ian W. Davis, Andrew Leaver-Fay, Vincent B. Chen, ...
SAC
2008
ACM
14 years 12 months ago
Digital audio watermarking evaluation within the application field of perceptual hashing
Digital watermarking is a growing research area to mark digital content by embedding information into the content itself. Perceptual hashing is used to identify a specific content...
Andreas Lang, Jana Dittmann
156
Voted
BMCBI
2008
181views more  BMCBI 2008»
14 years 11 months ago
Assessing batch effects of genotype calling algorithm BRLMM for the Affymetrix GeneChip Human Mapping 500 K array set using 270
Background: Genome-wide association studies (GWAS) aim to identify genetic variants (usually single nucleotide polymorphisms [SNPs]) across the entire human genome that are associ...
Huixiao Hong, Zhenqiang Su, Weigong Ge, Leming M. ...
135
Voted
NAR
2008
174views more  NAR 2008»
14 years 11 months ago
miRGator: an integrated system for functional annotation of microRNAs
MicroRNAs (miRNAs) constitute an important class of regulators that are involved in various cellular and disease processes. However, the functional significance of each miRNA is m...
Seungyoon Nam, Bumjin Kim, Seokmin Shin, Sanghyuk ...
123
Voted
WCRE
2010
IEEE
14 years 10 months ago
Software Process Recovery: Recovering Process from Artifacts
—Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons in...
Abram Hindle