Sciweavers

1235 search results - page 236 / 247
» Updating a cracked database
Sort
View
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
BMCBI
2008
143views more  BMCBI 2008»
13 years 7 months ago
Gene identification and protein classification in microbial metagenomic sequence data via incremental clustering
Background: The identification and study of proteins from metagenomic datasets can shed light on the roles and interactions of the source organisms in their communities. However, ...
Shibu Yooseph, Weizhong Li, Granger G. Sutton
BMCBI
2008
117views more  BMCBI 2008»
13 years 7 months ago
Using a logical model to predict the growth of yeast
Background: A logical model of the known metabolic processes in S. cerevisiae was constructed from iFF708, an existing Flux Balance Analysis (FBA) model, and augmented with inform...
Ken E. Whelan, Ross D. King
BMCBI
2010
104views more  BMCBI 2010»
13 years 7 months ago
A method for automatically extracting infectious disease-related primers and probes from the literature
Background: Primer and probe sequences are the main components of nucleic acid-based detection systems. Biologists use primers and probes for different tasks, some related to the ...
Miguel García-Remesal, Alejandro Cuevas, Vi...
BMCBI
2008
130views more  BMCBI 2008»
13 years 7 months ago
Gene Prospector: An evidence gateway for evaluating potential susceptibility genes and interacting risk factors for human diseas
Background: Millions of single nucleotide polymorphisms have been identified as a result of the human genome project and the rapid advance of high throughput genotyping technology...
Wei Yu, Anja Wulf, Tiebin Liu, Muin J. Khoury, Mar...