Sciweavers

545 search results - page 108 / 109
» A Hierarchy Based on Output Multiplicity
Sort
View
BMCBI
2007
109views more  BMCBI 2007»
13 years 7 months ago
Seahawk: moving beyond HTML in Web-based bioinformatics analysis
Background: Traditional HTML interfaces for input to and output from Bioinformatics analysis on the Web are highly variable in style, content and data formats. Combining multiple ...
Paul M. K. Gordon, Christoph W. Sensen
BMCBI
2008
122views more  BMCBI 2008»
13 years 7 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
BMCBI
2006
240views more  BMCBI 2006»
13 years 7 months ago
Statistical analysis of real-time PCR data
Background: Even though real-time PCR has been broadly applied in biomedical sciences, data processing procedures for the analysis of quantitative real-time PCR are still lacking;...
Joshua S. Yuan, Ann Reed, Feng Chen, C. Neal Stewa...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 5 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
ICASSP
2011
IEEE
12 years 11 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...