Protocol analysis

Results: 1021



#Item
101protocol  Differential gene and transcript expression analysis of RNA-seq experiments with TopHat and Cufflinks Cole Trapnell1,2, Adam Roberts3, Loyal Goff 1,2,4, Geo Pertea5,6, Daehwan Kim5,7, David R Kelley1,2, Harold

protocol Differential gene and transcript expression analysis of RNA-seq experiments with TopHat and Cufflinks Cole Trapnell1,2, Adam Roberts3, Loyal Goff 1,2,4, Geo Pertea5,6, Daehwan Kim5,7, David R Kelley1,2, Harold

Add to Reading List

Source URL: ccb.jhu.edu

Language: English - Date: 2013-06-10 13:06:43
    102RAPTOR: Routing Attacks on Privacy in Tor  arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

    RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2015-03-17 04:19:13
    103Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

    Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2009-07-24 09:49:57
      104BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

      BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2008-05-09 14:43:43
      105GEISHA Project miRNA Detection Protocol Version 1.1 Gallus Expression In Situ Hybridization Analysis http://geisha.arizona.edu  Whole Mount microRNA ISH Protocol (Shorter Version)

      GEISHA Project miRNA Detection Protocol Version 1.1 Gallus Expression In Situ Hybridization Analysis http://geisha.arizona.edu Whole Mount microRNA ISH Protocol (Shorter Version)

      Add to Reading List

      Source URL: geisha.arizona.edu

      Language: English - Date: 2011-09-14 21:00:04
        106protocol  Differential gene and transcript expression analysis of RNA-seq experiments with TopHat and Cufflinks Cole Trapnell1,2, Adam Roberts3, Loyal Goff 1,2,4, Geo Pertea5,6, Daehwan Kim5,7, David R Kelley1,2, Harold

        protocol Differential gene and transcript expression analysis of RNA-seq experiments with TopHat and Cufflinks Cole Trapnell1,2, Adam Roberts3, Loyal Goff 1,2,4, Geo Pertea5,6, Daehwan Kim5,7, David R Kelley1,2, Harold

        Add to Reading List

        Source URL: www.ccb.jhu.edu

        Language: English - Date: 2016-02-19 13:34:11
          107Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia

          Analysis of Fair Queueing schedulers in Real Systems Luigi Rizzo Universita‘ di Pisa Paolo Valente Universita‘ di Modena e Reggio Emilia

          Add to Reading List

          Source URL: info.iet.unipi.it

          Language: English - Date: 2012-05-25 16:00:35
          108Mercury Falling New requirements for low-level mercury monitoring necessitate changes in sample collection and analysis procedures and protocol Mark Bruce, Patrick O’Meara, Scott Irwin, Jeffrey Smith, and Rebecca Strai

          Mercury Falling New requirements for low-level mercury monitoring necessitate changes in sample collection and analysis procedures and protocol Mark Bruce, Patrick O’Meara, Scott Irwin, Jeffrey Smith, and Rebecca Strai

          Add to Reading List

          Source URL: www.teledyneleemanlabs.com

          Language: English - Date: 2006-05-02 09:47:49
            109Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu  ABSTRACT

            Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

            Add to Reading List

            Source URL: vanbever.eu

            Language: English - Date: 2014-10-08 09:38:20
            110Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham  Anonymity with identity escrow attempts to allow users of an on-line service to remai

            Identity Escrow Protocol and Anonymity Analysis in the Applied pi-calculus AYBEK MUKHAMEDOV AND MARK D. RYAN University of Birmingham Anonymity with identity escrow attempts to allow users of an on-line service to remai

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            Language: English - Date: 2011-01-18 08:48:08