Sciweavers

861 search results - page 164 / 173
» Predicting Attack-prone Components
Sort
View
CIMAGING
2010
165views Hardware» more  CIMAGING 2010»
13 years 7 months ago
Virtual surgical modification for planning tetralogy of Fallot repair
Goals for treating congenital heart defects are becoming increasingly focused on the long-term, targeting solutions that last into adulthood. Although this shift has motivated the...
Jonathan Plasencia, Haithem Babiker, Randy Richard...
HPDC
2010
IEEE
13 years 7 months ago
A GPU accelerated storage system
Massively multicore processors, like, for example, Graphics Processing Units (GPUs), provide, at a comparable price, a one order of magnitude higher peak performance than traditio...
Abdullah Gharaibeh, Samer Al-Kiswany, Sathish Gopa...
BMCBI
2010
178views more  BMCBI 2010»
13 years 7 months ago
CNV Workshop: an integrated platform for high-throughput copy number variation discovery and clinical diagnostics
Background: Recent studies have shown that copy number variations (CNVs) are frequent in higher eukaryotes and associated with a substantial portion of inherited and acquired risk...
Xiaowu Gai, Juan C. Perin, Kevin Murphy, Ryan O'Ha...
BMCBI
2010
116views more  BMCBI 2010»
13 years 7 months ago
A hybrid approach to protein folding problem integrating constraint programming with local search
Background: The protein folding problem remains one of the most challenging open problems in computational biology. Simplified models in terms of lattice structure and energy func...
Abu Zafer M. Dayem Ullah, Kathleen Steinhöfel
BMCBI
2010
100views more  BMCBI 2010»
13 years 7 months ago
Using genomic signatures for HIV-1 sub-typing
Background: Human Immunodeficiency Virus type 1 (HIV-1), the causative agent of Acquired Immune Deficiency Syndrome (AIDS), exhibits very high genetic diversity with different var...
Aridaman Pandit, Somdatta Sinha