Sciweavers

1202 search results - page 135 / 241
» Robust system multiangulation using subspace methods
Sort
View
BMCBI
2010
176views more  BMCBI 2010»
14 years 10 months ago
Reverse engineering gene regulatory network from microarray data using linear time-variant model
nd: Gene regulatory network is an abstract mapping of gene regulations in living cells that can help to predict the system behavior of living organisms. Such prediction capability...
Mitra Kabir, Nasimul Noman, Hitoshi Iba
BMCBI
2008
100views more  BMCBI 2008»
14 years 10 months ago
Hotspot Hunter: a computational system for large-scale screening and selection of candidate immunological hotspots in pathogen p
Background: T-cell epitopes that promiscuously bind to multiple alleles of a human leukocyte antigen (HLA) supertype are prime targets for development of vaccines and immunotherap...
Guanglan Zhang, Asif M. Khan, Kellathur N. Sriniva...
ALMOB
2006
113views more  ALMOB 2006»
14 years 10 months ago
Inverse bifurcation analysis: application to simple gene systems
Background: Bifurcation analysis has proven to be a powerful method for understanding the qualitative behavior of gene regulatory networks. In addition to the more traditional for...
James Lu, Heinz W. Engl, Peter Schuster
ISSAC
2005
Springer
119views Mathematics» more  ISSAC 2005»
15 years 3 months ago
Computing the multiplicity structure in solving polynomial systems
This paper presents a duality analysis and an algorithm for computing the multiplicity structure of a zero to a polynomial system, while the zero can be exact or approximate with ...
Barry H. Dayton, Zhonggang Zeng
WSC
2007
15 years 6 days ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...