Sciweavers

5722 search results - page 1142 / 1145
» Security Function Interactions
Sort
View
TSMC
2010
13 years 3 months ago
Cellular Learning Automata With Multiple Learning Automata in Each Cell and Its Applications
The cellular learning automaton (CLA), which is a4 combination of cellular automaton (CA) and learning automaton5 (LA), is introduced recently. This model is superior to CA because...
Hamid Beigy, Mohammad Reza Meybodi
BMCBI
2011
13 years 5 days ago
HomPPI: A Class of Sequence Homology Based Protein-Protein Interface Prediction Methods
Background: Although homology-based methods are among the most widely used methods for predicting the structure and function of proteins, the question as to whether interface sequ...
Li C. Xue, Drena Dobbs, Vasant Honavar
INFOCOM
2011
IEEE
13 years 4 hour ago
Optimal control of epidemic evolution
—Epidemic models based on nonlinear differential equations have been extensively applied in a variety of systems as diverse as infectious outbreaks, marketing, diffusion of belie...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
JCC
2011
154views more  JCC 2011»
12 years 11 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
NAR
2011
340views Computer Vision» more  NAR 2011»
12 years 11 months ago
CCDB: a curated database of genes involved in cervix cancer
The Cervical Cancer gene DataBase (CCDB, http:// crdd.osdd.net/raghava/ccdb) is a manually curated catalog of experimentally validated genes that are thought, or are known to be i...
Subhash M. Agarwal, Dhwani Raghav, Harinder Singh,...
« Prev « First page 1142 / 1145 Last » Next »