Sciweavers

6724 search results - page 1311 / 1345
» Models. Models. Models. So What
Sort
View
BMCBI
2007
157views more  BMCBI 2007»
13 years 8 months ago
Statistical learning of peptide retention behavior in chromatographic separations: a new kernel-based approach for computational
Background: High-throughput peptide and protein identification technologies have benefited tremendously from strategies based on tandem mass spectrometry (MS/MS) in combination wi...
Nico Pfeifer, Andreas Leinenbach, Christian G. Hub...
BMCBI
2007
116views more  BMCBI 2007»
13 years 8 months ago
Clustering protein environments for function prediction: finding PROSITE motifs in 3D
Background: Structural genomics initiatives are producing increasing numbers of threedimensional (3D) structures for which there is little functional information. Structure-based ...
Sungroh Yoon, Jessica C. Ebert, Eui-Young Chung, G...
BMCBI
2007
149views more  BMCBI 2007»
13 years 8 months ago
Robust imputation method for missing values in microarray data
Background: When analyzing microarray gene expression data, missing values are often encountered. Most multivariate statistical methods proposed for microarray data analysis canno...
Dankyu Yoon, Eun-Kyung Lee, Taesung Park
IEICET
2006
108views more  IEICET 2006»
13 years 8 months ago
Plaintext Simulatability
We propose a new security class, called plaintext-simulatability, defined over the public-key encryption schemes. The notion of plaintext simulatability (denoted PS) is similar to ...
Eiichiro Fujisaki
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
« Prev « First page 1311 / 1345 Last » Next »