Sciweavers

2391 search results - page 446 / 479
» From Nature to Methods and Back to Nature
Sort
View
JCB
2006
144views more  JCB 2006»
14 years 9 months ago
Modeling Virus Self-Assembly Pathways: Avoiding Dynamics Using Geometric Constraint Decomposition
We develop a model for elucidating the assembly pathways by which an icosahedral viral shell forms from 60 identical constituent protein monomers. This poorly understood process a...
Meera Sitharam, Mavis Agbandje-Mckenna
ENTCS
2007
108views more  ENTCS 2007»
14 years 9 months ago
Generating Java Compiler Optimizers Using Bidirectional CTL
There have been several research works that analyze and optimize programs using temporal logic. However, no evaluation of optimization time or execution time of these implementati...
Ling Fang, Masataka Sassa
IJHPCA
2007
118views more  IJHPCA 2007»
14 years 9 months ago
Implementing MPI-IO Atomic Mode and Shared File Pointers Using MPI One-Sided Communication
The ROMIO implementation of the MPI-IO standard provides a portable infrastructure for use on top of a variety of underlying storage targets. These targets vary widely in their ca...
Robert Latham, Robert B. Ross, Rajeev Thakur
BMCBI
2005
121views more  BMCBI 2005»
14 years 9 months ago
Evaluation of gene importance in microarray data based upon probability of selection
Background: Microarray devices permit a genome-scale evaluation of gene function. This technology has catalyzed biomedical research and development in recent years. As many import...
Li M. Fu, Casey S. Fu-Liu
TKDE
2008
125views more  TKDE 2008»
14 years 9 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky