As an outgrowth of our interest in dense wireless sensing and expressive applications of wearable computing, we have developed the world's most versatile human-computer inter...
Joseph A. Paradiso, Kai-yuh Hsiao, Ari Y. Benbasat...
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
We present a novel method for predicting the secondary structure of a protein from its amino acid sequence. Most existing methods predict each position in turn based on a local wi...
Scott C. Schmidler, Jun S. Liu, Douglas L. Brutlag
Activation of calcium/calmodulin-dependent protein kinase II (CaMKII) by calmodulin following calcium entry into the cell is important for long-term potentiation (LTP). Here a mode...
Abstract. Voltage-gated ion channels in neuronal membranes fluctuate randomly between different conformational states due to thermal agitation. Fluctuations between conducting and ...
Peter N. Steinmetz, Amit Manwani, Christof Koch, M...