Sciweavers

4343 search results - page 864 / 869
» Replication Techniques for Availability
Sort
View
BMCBI
2011
14 years 3 months ago
LAVA: An Open-Source Approach To Designing LAMP (Loop-Mediated Isothermal Amplification) DNA Signatures
Background: We developed an extendable open-source Loop-mediated isothermal AMPlification (LAMP) signature design program called LAVA (LAMP Assay Versatile Analysis). LAVA was cre...
Clinton Torres, Elizabeth A. Vitalis, Brian R. Bak...
BMCBI
2011
14 years 3 months ago
AMDORAP: Non-targeted metabolic profiling based on high-resolution LC-MS
Background: Liquid chromatography-mass spectrometry (LC-MS) utilizing the high-resolution power of an orbitrap is an important analytical technique for both metabolomics and prote...
Hiroki Takahashi, Takuya Morimoto, Naotake Ogasawa...
106
Voted
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 3 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
114
Voted
EDBT
2011
ACM
199views Database» more  EDBT 2011»
14 years 3 months ago
Predicting completion times of batch query workloads using interaction-aware models and simulation
A question that database administrators (DBAs) routinely need to answer is how long a batch query workload will take to complete. This question arises, for example, while planning...
Mumtaz Ahmad, Songyun Duan, Ashraf Aboulnaga, Shiv...
117
Voted
JCC
2011
154views more  JCC 2011»
14 years 2 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...