Sciweavers

2652 search results - page 481 / 531
» When Information Improves Information Security
Sort
View
BMCBI
2008
142views more  BMCBI 2008»
14 years 12 months ago
Strategies for measuring evolutionary conservation of RNA secondary structures
Background: Evolutionary conservation of RNA secondary structure is a typical feature of many functional non-coding RNAs. Since almost all of the available methods used for predic...
Andreas R. Gruber, Stephan H. F. Bernhart, Ivo L. ...
BMCBI
2008
127views more  BMCBI 2008»
14 years 12 months ago
AMMO-Prot: amine system project 3D-model finder
Background: Amines are biogenic amino acid derivatives, which play pleiotropic and very important yet complex roles in animal physiology. For many other relevant biomolecules, bio...
Ismael Navas Delgado, Raúl Montañez,...
BMCBI
2006
116views more  BMCBI 2006»
14 years 12 months ago
Gene annotation and network inference by phylogenetic profiling
Background: Phylogenetic analysis is emerging as one of the most informative computational methods for the annotation of genes and identification of evolutionary modules of functi...
Jie Wu, Zhenjun Hu, Charles DeLisi
CORR
2006
Springer
119views Education» more  CORR 2006»
14 years 12 months ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai
CN
2007
133views more  CN 2007»
14 years 12 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...