Sciweavers

51 search results - page 6 / 11
» The Immune System in Pieces: Computational Lessons from Dege...
Sort
View
COMPSAC
2009
IEEE
14 years 5 days ago
Temporally Robust Software Features for Authorship Attribution
Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity inve...
Steven Burrows, Alexandra L. Uitdenbogerd, Andrew ...
PPSN
2000
Springer
13 years 11 months ago
Optimization as Side-Effect of Evolving Allelopathic Diversity
Many bacteria carry gene complexes that code for a toxin-antidote pair, e.g. colicin systems. Such gene complexes can be advantageous for its host by killing competitor bacteria wh...
Ludo Pagie, Paulien Hogeweg
BMCBI
2010
109views more  BMCBI 2010»
13 years 7 months ago
Prediction of the binding affinities of peptides to class II MHC using a regularized thermodynamic model
Background: The binding of peptide fragments of extracellular peptides to class II MHC is a crucial event in the adaptive immune response. Each MHC allotype generally binds a dist...
Andrew J. Bordner, Hans D. Mittelmann
CSB
2003
IEEE
121views Bioinformatics» more  CSB 2003»
14 years 23 days ago
Epitope Prediction Algorithms for Peptide based Vaccine Design
Peptide-based vaccines, in which small peptides derived from target proteins (epitopes) are used to provoke an immune reaction, have attracted considerable attention recently as a...
Liliana Florea, Bjarni V. Halldórsson, Oliv...
SECON
2007
IEEE
14 years 1 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao