Sciweavers

2702 search results - page 492 / 541
» Requirements Processes: An Experience Report
Sort
View
BMCBI
2008
136views more  BMCBI 2008»
13 years 10 months ago
An efficient method for the prediction of deleterious multiple-point mutations in the secondary structure of RNAs using suboptim
Background: RNAmute is an interactive Java application which, given an RNA sequence, calculates the secondary structure of all single point mutations and organizes them into categ...
Alexander Churkin, Danny Barash
BMCBI
2008
79views more  BMCBI 2008»
13 years 10 months ago
In silico docking of urokinase plasminogen activator and integrins
Background: Urokinase, its receptor and the integrins are functionally associated and involved in regulation of cell signaling, migration, adhesion and proliferation. No structura...
Bernard Degryse, Juan Fernández-Recio, Vale...
CGF
2008
142views more  CGF 2008»
13 years 10 months ago
Visualizing Genome Expression and Regulatory Network Dynamics in Genomic and Metabolic Context
DNA microarrays are used to measure the expression levels of thousands of genes simultaneously. In a time series experiment, the gene expressions are measured as a function of tim...
Michel A. Westenberg, Sacha A. F. T. van Hijum, Os...
BMCBI
2006
128views more  BMCBI 2006»
13 years 10 months ago
Construction of a nasopharyngeal carcinoma 2D/MS repository with Open Source XML Database - Xindice
Background: Many proteomics initiatives require integration of all information with uniformcriteria from collection of samples and data display to publication of experimental resu...
Feng Li, Maoyu Li, Zhiqiang Xiao, Pengfei Zhang, J...
CN
2004
256views more  CN 2004»
13 years 9 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...