Sciweavers

11665 search results - page 2195 / 2333
» Human computing for EDA
Sort
View
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
BMCBI
2010
126views more  BMCBI 2010»
14 years 10 months ago
Cgaln: fast and space-efficient whole-genome alignment
Background: Whole-genome sequence alignment is an essential process for extracting valuable information about the functions, evolution, and peculiarities of genomes under investig...
Ryuichiro Nakato, Osamu Gotoh
BMCBI
2008
133views more  BMCBI 2008»
14 years 10 months ago
MS-DOCK: Accurate multiple conformation generator and rigid docking protocol for multi-step virtual ligand screening
Background: The number of protein targets with a known or predicted tri-dimensional structure and of drug-like chemical compounds is growing rapidly and so is the need for new the...
Nicolas Sauton, David Lagorce, Bruno O. Villoutrei...
BMCBI
2007
107views more  BMCBI 2007»
14 years 10 months ago
A general and efficient method for estimating continuous IBD functions for use in genome scans for QTL
Background: Identity by descent (IBD) matrix estimation is a central component in mapping of Quantitative Trait Loci (QTL) using variance component models. A large number of algor...
Francois Besnier, Örjan Carlborg
BMCBI
2008
133views more  BMCBI 2008»
14 years 10 months ago
A Web-based and Grid-enabled dChip version for the analysis of large sets of gene expression data
Background: Microarray techniques are one of the main methods used to investigate thousands of gene expression profiles for enlightening complex biological processes responsible f...
Luca Corradi, Marco Fato, Ivan Porro, Silvia Scagl...
« Prev « First page 2195 / 2333 Last » Next »