Sciweavers

36887 search results - page 7320 / 7378
» Are We All In the Same
Sort
View
JCB
2006
114views more  JCB 2006»
13 years 9 months ago
A General Modeling Strategy for Gene Regulatory Networks with Stochastic Dynamics
A stochastic genetic toggle switch model that consists of two identical, mutually repressive genes is built using the Gillespie algorithm with time delays as an example of a simpl...
Andre Ribeiro, Rui Zhu, Stuart A. Kauffman
JCB
2006
215views more  JCB 2006»
13 years 9 months ago
Protein Fold Recognition Using Segmentation Conditional Random Fields (SCRFs)
Protein fold recognition is an important step towards understanding protein three-dimensional structures and their functions. A conditional graphical model, i.e., segmentation con...
Yan Liu 0002, Jaime G. Carbonell, Peter Weigele, V...
JSAC
2008
118views more  JSAC 2008»
13 years 9 months ago
PEEC: a channel-adaptive feedback-based error
Reliable transmission is a challenging task over wireless LANs since wireless links are known to be susceptible to errors. Although the current IEEE802.11 standard ARQ error contro...
Sohraab Soltani, Hayder Radha
DKE
2007
82views more  DKE 2007»
13 years 9 months ago
Eliciting information for product modeling using process modeling
A product model is a formal and structured definition of product information. The most common procedure for defining a product data model is to first describe the business and/...
Ghang Lee, Charles M. Eastman, Rafael Sacks
JUCS
2008
156views more  JUCS 2008»
13 years 9 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
« Prev « First page 7320 / 7378 Last » Next »