Sciweavers

5722 search results - page 1087 / 1145
» Security Function Interactions
Sort
View
BMCBI
2005
134views more  BMCBI 2005»
13 years 9 months ago
Inherited disorder phenotypes: controlled annotation and statistical analysis for knowledge mining from gene lists
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...
TOG
2008
174views more  TOG 2008»
13 years 9 months ago
Real-time smoke rendering using compensated ray marching
We present a real-time algorithm called compensated ray marching for rendering of smoke under dynamic low-frequency environment lighting. Our approach is based on a decomposition ...
Kun Zhou, Zhong Ren, Stephen Lin, Hujun Bao, Baini...
TRS
2008
13 years 9 months ago
The Neurophysiological Bases of Cognitive Computation Using Rough Set Theory
A popular view is that the brain works in a similar way to a digital computer or a Universal Turing Machine by processing symbols. Psychophysical experiments and our amazing capabi...
Andrzej W. Przybyszewski
BMCBI
2004
120views more  BMCBI 2004»
13 years 9 months ago
Optimal cDNA microarray design using expressed sequence tags for organisms with limited genomic information
Background: Expression microarrays are increasingly used to characterize environmental responses and hostparasite interactions for many different organisms. Probe selection for cD...
Yian A. Chen, David J. Mckillen, Shuyuan Wu, Matth...
BMCBI
2004
177views more  BMCBI 2004»
13 years 9 months ago
Gapped alignment of protein sequence motifs through Monte Carlo optimization of a hidden Markov model
Background: Certain protein families are highly conserved across distantly related organisms and belong to large and functionally diverse superfamilies. The patterns of conservati...
Andrew F. Neuwald, Jun S. Liu
« Prev « First page 1087 / 1145 Last » Next »