101![protocol Differential gene and transcript expression analysis of RNA-seq experiments with TopHat and Cufflinks Cole Trapnell1,2, Adam Roberts3, Loyal Goff 1,2,4, Geo Pertea5,6, Daehwan Kim5,7, David R Kelley1,2, Harold protocol Differential gene and transcript expression analysis of RNA-seq experiments with TopHat and Cufflinks Cole Trapnell1,2, Adam Roberts3, Loyal Goff 1,2,4, Geo Pertea5,6, Daehwan Kim5,7, David R Kelley1,2, Harold](https://www.pdfsearch.io/img/c99b9490d95527fc04d0fb27bc83ad6e.jpg) | Add to Reading ListSource URL: ccb.jhu.eduLanguage: English - Date: 2013-06-10 13:06:43
|
---|
102![RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University](https://www.pdfsearch.io/img/d21b629205b2c30fe5fbed01e94190bc.jpg) | Add to Reading ListSource URL: vanbever.euLanguage: English - Date: 2015-03-17 04:19:13
|
---|
103![Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk](https://www.pdfsearch.io/img/a5282d966e337d53bb4aab6cfcd7088c.jpg) | Add to Reading ListSource URL: www.cs.bham.ac.ukLanguage: English - Date: 2009-07-24 09:49:57
|
---|
104![BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut](https://www.pdfsearch.io/img/bddf3b7c0123985e95fbc2d015fc311b.jpg) | Add to Reading ListSource URL: faculty.cs.tamu.eduLanguage: English - Date: 2008-05-09 14:43:43
|
---|
105![GEISHA Project miRNA Detection Protocol Version 1.1 Gallus Expression In Situ Hybridization Analysis http://geisha.arizona.edu Whole Mount microRNA ISH Protocol (Shorter Version) GEISHA Project miRNA Detection Protocol Version 1.1 Gallus Expression In Situ Hybridization Analysis http://geisha.arizona.edu Whole Mount microRNA ISH Protocol (Shorter Version)](https://www.pdfsearch.io/img/4fdaedab063e599168c95a06266acdcb.jpg) | Add to Reading ListSource URL: geisha.arizona.eduLanguage: English - Date: 2011-09-14 21:00:04
|
---|
106![protocol Differential gene and transcript expression analysis of RNA-seq experiments with TopHat and Cufflinks Cole Trapnell1,2, Adam Roberts3, Loyal Goff 1,2,4, Geo Pertea5,6, Daehwan Kim5,7, David R Kelley1,2, Harold protocol Differential gene and transcript expression analysis of RNA-seq experiments with TopHat and Cufflinks Cole Trapnell1,2, Adam Roberts3, Loyal Goff 1,2,4, Geo Pertea5,6, Daehwan Kim5,7, David R Kelley1,2, Harold](https://www.pdfsearch.io/img/86dcb13ab5997941bbd113691649c669.jpg) | Add to Reading ListSource URL: www.ccb.jhu.eduLanguage: English - Date: 2016-02-19 13:34:11
|
---|
107![Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia](https://www.pdfsearch.io/img/cab58ba6fa14eab66189bcbb987b65bb.jpg) | Add to Reading ListSource URL: info.iet.unipi.itLanguage: English - Date: 2012-05-25 16:00:35
|
---|
108![Mercury Falling New requirements for low-level mercury monitoring necessitate changes in sample collection and analysis procedures and protocol Mark Bruce, Patrick O’Meara, Scott Irwin, Jeffrey Smith, and Rebecca Strai Mercury Falling New requirements for low-level mercury monitoring necessitate changes in sample collection and analysis procedures and protocol Mark Bruce, Patrick O’Meara, Scott Irwin, Jeffrey Smith, and Rebecca Strai](https://www.pdfsearch.io/img/3e18532ca7141174ce30728b4d6f93e2.jpg) | Add to Reading ListSource URL: www.teledyneleemanlabs.comLanguage: English - Date: 2006-05-02 09:47:49
|
---|
109![Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT](https://www.pdfsearch.io/img/1c95a097efbf2b7642c14c7c10a91b4d.jpg) | Add to Reading ListSource URL: vanbever.euLanguage: English - Date: 2014-10-08 09:38:20
|
---|
110![Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham Anonymity with identity escrow attempts to allow users of an on-line service to remai Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham Anonymity with identity escrow attempts to allow users of an on-line service to remai](https://www.pdfsearch.io/img/ee7a4d4c7aaf2e8a308336938767d5d7.jpg) | Add to Reading ListSource URL: www.cs.bham.ac.ukLanguage: English - Date: 2011-01-18 08:48:08
|
---|