Sciweavers

5722 search results - page 1125 / 1145
» Security Function Interactions
Sort
View
BMCBI
2008
121views more  BMCBI 2008»
13 years 8 months ago
Stability of gene contributions and identification of outliers in multivariate analysis of microarray data
Background: Multivariate ordination methods are powerful tools for the exploration of complex data structures present in microarray data. These methods have several advantages com...
Florent Baty, Daniel Jaeger, Frank Preiswerk, Mart...
BMCBI
2008
136views more  BMCBI 2008»
13 years 8 months ago
An efficient method for the prediction of deleterious multiple-point mutations in the secondary structure of RNAs using suboptim
Background: RNAmute is an interactive Java application which, given an RNA sequence, calculates the secondary structure of all single point mutations and organizes them into categ...
Alexander Churkin, Danny Barash
BMCBI
2008
77views more  BMCBI 2008»
13 years 8 months ago
Stochastic models for the in silico simulation of synaptic processes
Background: Research in life sciences is benefiting from a large availability of formal description techniques and analysis methodologies. These allow both the phenomena investiga...
Andrea Bracciali, Marcello Brunelli, Enrico Catald...
ASE
2006
106views more  ASE 2006»
13 years 8 months ago
Integrating COTS Software into Systems through Instrumentation and Reasoning
Commercial-off-the-shelf (COTS) software tends to be cheap, reliable, and functionally powerful due to its large user base. It has thus become highly desirable to incorporate COTS ...
Alexander Egyed, Robert Balzer
BMCBI
2006
94views more  BMCBI 2006»
13 years 8 months ago
Metabolite coupling in genome-scale metabolic networks
Background: Biochemically detailed stoichiometric matrices have now been reconstructed for various bacteria, yeast, and for the human cardiac mitochondrion based on genomic and pr...
Scott A. Becker, Nathan D. Price, Bernhard O. Pals...
« Prev « First page 1125 / 1145 Last » Next »