Sciweavers

1156 search results - page 208 / 232
» Compositional Methods for Information-Hiding
Sort
View
FM
2006
Springer
146views Formal Methods» more  FM 2006»
13 years 11 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler
BMCBI
2010
127views more  BMCBI 2010»
13 years 7 months ago
Computational prediction of type III secreted proteins from gram-negative bacteria
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...
BMCBI
2008
143views more  BMCBI 2008»
13 years 7 months ago
Gene identification and protein classification in microbial metagenomic sequence data via incremental clustering
Background: The identification and study of proteins from metagenomic datasets can shed light on the roles and interactions of the source organisms in their communities. However, ...
Shibu Yooseph, Weizhong Li, Granger G. Sutton
BMCBI
2007
131views more  BMCBI 2007»
13 years 7 months ago
On the detection of functionally coherent groups of protein domains with an extension to protein annotation
Background: Protein domains coordinate to perform multifaceted cellular functions, and domain combinations serve as the functional building blocks of the cell. The available metho...
William A. McLaughlin, Ken Chen, Tingjun Hou, Wei ...
PR
2008
328views more  PR 2008»
13 years 7 months ago
Activity based surveillance video content modelling
This paper tackles the problem of surveillance video content modelling. Given a set of surveillance videos, the aims of our work are twofold: firstly a continuous video is segment...
Tao Xiang, Shaogang Gong