Sciweavers

9572 search results - page 1878 / 1915
» Cover Algorithms and Their Combination
Sort
View
BMCBI
2008
127views more  BMCBI 2008»
13 years 11 months ago
Human Pol II promoter recognition based on primary sequences and free energy of dinucleotides
Background: Promoter region plays an important role in determining where the transcription of a particular gene should be initiated. Computational prediction of eukaryotic Pol II ...
Jian-Yi Yang, Yu Zhou, Zu-Guo Yu, Vo Anh, Li-Qian ...
BMCBI
2008
189views more  BMCBI 2008»
13 years 11 months ago
AnEnPi: identification and annotation of analogous enzymes
Background: Enzymes are responsible for the catalysis of the biochemical reactions in metabolic pathways. Analogous enzymes are able to catalyze the same reactions, but they prese...
Thomas D. Otto, Ana Carolina R. Guimarães, ...
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 11 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CGF
2008
201views more  CGF 2008»
13 years 11 months ago
Fluid in Video: Augmenting Real Video with Simulated Fluids
We present a technique for coupling simulated fluid phenomena that interact with real dynamic scenes captured as a binocular video sequence. We first process the binocular video s...
Vivek Kwatra, Philippos Mordohai, Rahul Narain, Sa...
CN
2008
84views more  CN 2008»
13 years 11 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
« Prev « First page 1878 / 1915 Last » Next »