Background: The recent emergence of high-throughput automated image acquisition technologies has forever changed how cell biologists collect and analyze data. Historically, the in...
Zheng Yin, Xiaobo Zhou, Chris Bakal, Fuhai Li, You...
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
A new anatomical database, My Corporis Fabrica (MyCF), is presented. It extends the reference anatomical ontology FMA (the Foundational Model of Anatomy) with the possibility to co...
Olivier Palombi, Guillaume Bousquet, David Jospin,...
Background: The functional and structural characterisation of enzymes that belong to microbial metabolic pathways is very important for structure-based drug design. The main inter...
Helen A. Arcuri, Geraldo F. D. Zafalon, Evandro A....
Studies show that roughly one-third of searches that are performed on the web require the user to initiate subsequent searches. Bates [1] theorized that with every search the user...