Sciweavers

1639 search results - page 326 / 328
» Degree-constrained network flows
Sort
View
BMCBI
2010
177views more  BMCBI 2010»
13 years 10 months ago
Modular composition predicts kinase/substrate interactions
Background: Phosphorylation events direct the flow of signals and metabolites along cellular protein networks. Current annotations of kinase-substrate binding events are far from ...
Yichuan Liu, Aydin Tozeren
BMCBI
2007
176views more  BMCBI 2007»
13 years 10 months ago
Genome Expression Pathway Analysis Tool - Analysis and visualization of microarray gene expression data under genomic, proteomic
Background: Regulation of gene expression is relevant to many areas of biology and medicine, in the study of treatments, diseases, and developmental stages. Microarrays can be use...
Markus Weniger, Julia C. Engelmann, Jörg Schu...
BMCBI
2008
166views more  BMCBI 2008»
13 years 10 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
BMCBI
2008
102views more  BMCBI 2008»
13 years 10 months ago
Improving protein function prediction methods with integrated literature data
Background: Determining the function of uncharacterized proteins is a major challenge in the post-genomic era due to the problem's complexity and scale. Identifying a protein...
Aaron Gabow, Sonia M. Leach, William A. Baumgartne...
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 10 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg