Social tags describe images from many aspects including the visual content observable from the images, the context and usage of images, user opinions and others. Not all tags are ...
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
Background: The main aim of this study was to develop and implement an algorithm for the rapid, accurate and automated identification of paths leading from buried protein clefts, ...
Background: Normalization is a critical step in analysis of gene expression profiles. For duallabeled arrays, global normalization assumes that the majority of the genes on the ar...
Computational Biology needs computer-readable information records. Increasingly, meta-analysed and pre-digested information is being used in the follow up of high throughput exper...