Sciweavers

178 search results - page 35 / 36
» Towards Understanding the Importance of Variables in Dependa...
Sort
View
CSB
2005
IEEE
152views Bioinformatics» more  CSB 2005»
13 years 12 months ago
Consensus Genetic Maps: A Graph Theoretic Approach
A genetic map is an ordering of genetic markers constructed from genetic linkage data for use in linkage studies and experimental design. While traditional methods have focused on...
Benjamin G. Jackson, Srinivas Aluru, Patrick S. Sc...
INDOCRYPT
2005
Springer
13 years 11 months ago
On the Algebraic Immunity of Symmetric Boolean Functions
In this paper, we analyse the algebraic immunity of symmetric Boolean functions. We identify a set of lowest degree annihilators for symmetric functions and propose an efficient al...
An Braeken, Bart Preneel
BMCBI
2010
132views more  BMCBI 2010»
13 years 6 months ago
Data structures and compression algorithms for high-throughput sequencing technologies
Background: High-throughput sequencing (HTS) technologies play important roles in the life sciences by allowing the rapid parallel sequencing of very large numbers of relatively s...
Kenny Daily, Paul Rigor, Scott Christley, Xiaohui ...
BMCBI
2005
302views more  BMCBI 2005»
13 years 6 months ago
CGHPRO - A comprehensive data analysis tool for array CGH
Background: Array CGH (Comparative Genomic Hybridisation) is a molecular cytogenetic technique for the genome wide detection of chromosomal imbalances. It is based on the cohybrid...
Wei Chen, Fikret Erdogan, H.-Hilger Ropers, Steffe...
CSFW
2009
IEEE
14 years 1 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...