Sciweavers

2912 search results - page 547 / 583
» Overlay Networks - Implementation by Specification
Sort
View
BMCBI
2007
137views more  BMCBI 2007»
13 years 9 months ago
PlnTFDB: an integrative plant transcription factor database
Background: Transcription factors (TFs) are key regulatory proteins that enhance or repress the transcriptional rate of their target genes by binding to specific promoter regions ...
Diego Mauricio Riaño-Pachón, Sloboda...
BMCBI
2007
131views more  BMCBI 2007»
13 years 9 months ago
Prediction of peptides observable by mass spectrometry applied at the experimental set level
Background: When proteins are subjected to proteolytic digestion and analyzed by mass spectrometry using a method such as 2D LC MS/MS, only a portion of the proteotypic peptides a...
William S. Sanders, Susan M. Bridges, Fiona M. McC...
GRID
2006
Springer
13 years 9 months ago
Using Workflow for Dynamic Security Context Management in Grid-based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Leon Gommans, Cees de Laat, Arie T...
JUCS
2008
113views more  JUCS 2008»
13 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JDFP
2006
139views more  JDFP 2006»
13 years 9 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer