Sciweavers

1045 search results - page 205 / 209
» The Use of Exceptions
Sort
View
105
Voted
TIT
2008
83views more  TIT 2008»
15 years 10 days ago
Constrained Codes as Networks of Relations
We address the well-known problem of determining the capacity of constrained coding systems. While the onedimensional case is well understood to the extent that there are technique...
Moshe Schwartz, Jehoshua Bruck
BMCBI
2005
98views more  BMCBI 2005»
15 years 10 days ago
DCD - a novel plant specific domain in proteins involved in development and programmed cell death
Background: Recognition of microbial pathogens by plants triggers the hypersensitive reaction, a common form of programmed cell death in plants. These dying cells generate signals...
Raimund Tenhaken, Tobias Doerks, Peer Bork
100
Voted
MANSCI
2007
86views more  MANSCI 2007»
15 years 9 days ago
Proper Conditioning for Coherent VaR in Portfolio Management
Value at Risk (VaR) is a central concept in risk management. As stressed by Artzner et al. (1999), VaR may not possess the subadditivity property required to be a coherent measure...
René Garcia, Éric Renault, Georges T...
120
Voted
BMCBI
2004
146views more  BMCBI 2004»
15 years 9 days ago
The InDeVal insertion/deletion evaluation tool: a program for finding target regions in DNA sequences and for aiding in sequence
Background: The program InDeVal was originally developed to help researchers find known regions of insertion/deletion activity (with the exception of isolated single-base indels) ...
Sierra D. Stoneberg Holt, Jason A. Holt
BMCBI
2004
148views more  BMCBI 2004»
15 years 9 days ago
Bioinformatics analysis of SARS coronavirus genome polymorphism
Background: We have compared 38 isolates of the SARS-CoV complete genome. The main goal was twofold: first, to analyze and compare nucleotide sequences and to identify positions o...
Gordana Pavlovic-Lazetic, Nenad S. Mitic, Milos V....