Sciweavers

3058 search results - page 300 / 612
» Reflections on
Sort
View
BMCBI
2008
78views more  BMCBI 2008»
15 years 4 months ago
Deducing topology of protein-protein interaction networks from experimentally measured sub-networks
Background: Protein-protein interaction networks are commonly sampled using yeast two hybrid approaches. However, whether topological information reaped from these experimentallym...
Ling Yang, Thomas M. Vondriska, Zhangang Han, W. R...
BMCBI
2008
99views more  BMCBI 2008»
15 years 4 months ago
Exhaustive prediction of disease susceptibility to coding base changes in the human genome
Background: Single Nucleotide Polymorphisms (SNPs) are the most abundant form of genomic variation and can cause phenotypic differences between individuals, including diseases. Ba...
Vinayak Kulkarni, Mounir Errami, Robert Barber, Ha...
COMCOM
2010
133views more  COMCOM 2010»
15 years 4 months ago
Measuring long-term location privacy in vehicular communication systems
Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many ...
Zhendong Ma, Frank Kargl, Michael Weber
CORR
2010
Springer
116views Education» more  CORR 2010»
15 years 4 months ago
Where are the hard manipulation problems?
One possible escape from the Gibbard-Satterthwaite theorem is computational complexity. For example, it is NP-hard to compute if the STV rule can be manipulated. However, there is...
Toby Walsh
ASE
2006
110views more  ASE 2006»
15 years 4 months ago
Runtime recovery and manipulation of software architecture of component-based systems
Recently, more attention is paid to the researches and practices on how to use software architecture in software maintenance and evolution to reduce their complexity and cost. The ...
Gang Huang, Hong Mei, Fuqing Yang