In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Background: Cis-regulatory modules (CRMs) are distinct, genomic regions surrounding the target gene that can independently activate the promoter to drive transcription. The activa...
Background: We performed an exhaustive search for local structural similarities in an ensemble of non-redundant protein functional sites. With the purpose of finding new examples ...
Background: Recognition of microbial pathogens by plants triggers the hypersensitive reaction, a common form of programmed cell death in plants. These dying cells generate signals...
In an 2D echocardiogram exam, an ultrasound probe
samples the heart with 2D slices. Changing the orientation
and position on the probe changes the slice viewpoint, altering
the ...
Ritwik Kumar, Fei Wang, David Beymer, Tanveer Fath...