Sciweavers

835 search results - page 158 / 167
» Characterizing rosy theories
Sort
View
CCS
2010
ACM
13 years 10 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
ALMOB
2007
170views more  ALMOB 2007»
13 years 10 months ago
A spatio-temporal mining approach towards summarizing and analyzing protein folding trajectories
Understanding the protein folding mechanism remains a grand challenge in structural biology. In the past several years, computational theories in molecular dynamics have been empl...
Hui Yang, Srinivasan Parthasarathy, Duygu Ucar
BMCBI
2010
214views more  BMCBI 2010»
13 years 10 months ago
AutoSOME: a clustering method for identifying gene expression modules without prior knowledge of cluster number
Background: Clustering the information content of large high-dimensional gene expression datasets has widespread application in "omics" biology. Unfortunately, the under...
Aaron M. Newman, James B. Cooper
BMCBI
2008
126views more  BMCBI 2008»
13 years 10 months ago
Combining Shapley value and statistics to the analysis of gene expression data in children exposed to air pollution
Background: In gene expression analysis, statistical tests for differential gene expression provide lists of candidate genes having, individually, a sufficiently low p-value. Howe...
Stefano Moretti, Danitsja van Leeuwen, Hans Gmuend...
BMCBI
2008
128views more  BMCBI 2008»
13 years 10 months ago
Efficient computation of absent words in genomic sequences
Background: Analysis of sequence composition is a routine task in genome research. Organisms are characterized by their base composition, dinucleotide relative abundance, codon us...
Julia Herold, Stefan Kurtz, Robert Giegerich