A Process for Visualizing Disordered Molecular Data with a Case Study in Bulk Water (English)
- New search for: Leaf, Nick
- New search for: Ma, Kwan-Liu
- New search for: Zhang, Cui
- New search for: Galli, Giulia
- New search for: Leaf, Nick
- New search for: Ma, Kwan-Liu
- New search for: Zhang, Cui
- New search for: Galli, Giulia
In:
2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom)
;
34-42
;
2012
- Conference paper / Electronic Resource
-
Title:A Process for Visualizing Disordered Molecular Data with a Case Study in Bulk Water
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2012-12-01
-
Size:1115670 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
3-D Tomosynthesis Image Reconstruction Using Total VariationErtas, Metin / Akan, Aydin / Cengiz, Kubra / Kamasak, Mustafa / Seyyedi, Saeed / Yildirim, Isa et al. | 2012
- 6
-
Affymetrix® Mismatch (MM) Probes: Useful after AllFlight, Robert M. / Eteleeb, Abdallah M. / Rouchka, Eric C. et al. | 2012
- 14
-
Performance Analyses of a Parallel Verlet Neighbor List Algorithm for GPU-Optimized MD SimulationsProctor, Andrew J. / Lipscomb, Tyson J. / Zou, Anqi / Anderson, Joshua A. / Cho, Samuel S. et al. | 2012
- 20
-
Hybrid Multi-layered GMDH-Type Neural Network Using Principal Component-Regression Analysis and Its Application to Medical Image Diagnosis of Lung CancerKondo, Tadashi / Ueno, Junji / Takao, Schoichiro et al. | 2012
- 28
-
Emerging Infectious Disease: A Computational Multi-agent ModelQin, Hong / Shapiro, Alexander / Yang, Li et al. | 2012
- 34
-
A Process for Visualizing Disordered Molecular Data with a Case Study in Bulk WaterLeaf, Nick / Ma, Kwan-Liu / Zhang, Cui / Galli, Giulia et al. | 2012
- 43
-
Study of HRV Dynamics and Comparison Using Wavelet Analysis and Pan Tompkins AlgorithmGoyal, Yamini / Jain, Anshul et al. | 2012
- 50
-
Identification of Surface and Deep Layer Muscle Activity by EMG Propagation DirectionKoshio, Toshiki / Sakurazawa, Shigeru / Toda, Masashi / Akita, Junichi / Kondo, Kazuaki / Nakamura, Yuichi et al. | 2012
- 55
-
Towards an Optimizing Model for Older People at Risk of FallsAlbu-Shamah, Ahmad / Zhan, Justin et al. | 2012
- 59
-
A Framework for Model Checking of Large Scale Disease Spread ModelsGhosh, Krishnendu et al. | 2012
- 62
-
Early Results from Metamorphic Testing of Epidemiological ModelsPullum, Laura L. / Ozmen, Ozgur et al. | 2012
- 68
-
Verification of Compartmental Epidemiological Models Using Metamorphic Testing, Model Checking and Visual AnalyticsRamanathan, Arvind / Steed, Chad A. / Pullum, Laura L. et al. | 2012
- 74
-
Agent-Based vs. Equation-Based Epidemiological Models: A Model Selection Case StudySukumar, Sreenivas R. / Nutaro, James J. et al. | 2012
- 80
-
Quantifying Uncertainty in Epidemiological ModelsJha, Sumit K. / Ramanathan, Arvind et al. | 2012
- 86
-
A Modular Testing Environment for Implementation AttacksJudge, Lyndon / Cantrell, Michael / Kendir, Cagil / Schaumont, Patrick et al. | 2012
- 96
-
S*FSM: A Paradigm Shift for Attack Resistant FSM Designs and EncodingsBorowczak, Mike / Vemuri, Ranga et al. | 2012
- 101
-
Scalable and Reusable Attack Aware SoftwareKim, William / Moon, Cheolmin Sky / Chung, Sam / Escrig, Teresa / Endicott-Popovsky, Barbara et al. | 2012
- 105
-
READ -- A Resolution and Abduction Based Approach for Policy Comparison in Organizational CollaborationXia, Xiaofeng et al. | 2012
- 113
-
Security Engineering and Modelling of Set-Top BoxesRuiz, Jose Fran. / Rein, Andre / Arjona, Marcos / Mana, Antonio / Monsifrot, Antoine / Morvan, Michel et al. | 2012
- 123
-
2TAC: Distributed Access Control Architecture for "Bring Your Own Device" SecurityChung, Sean / Chung, Sam / Escrig, Teresa / Bai, Yan / Endicott-Popovsky, Barbara et al. | 2012
- 127
-
A Misuse Pattern for Retrieving Data from a Database Using SQL InjectionFernandez, Eduardo B. / Alder, Ernest / Bagley, Richard / Paghdar, Swati et al. | 2012
- 132
-
Introducing Security Building Block ModelsRein, Andre / Rudolph, Carsten / Ruiz, Jose Fran. / Arjona, Marcos et al. | 2012
- 140
-
A Pattern for Software-as-a-Service in CloudsHashizume, Keiko / Fernandez, Eduardo B. / Larrondo-Petrie, Maria M. et al. | 2012
- 145
-
Security Engineering Based on Structured Formal ReasoningFuchs, Andreas / Rudolph, Carsten et al. | 2012
- 153
-
Author index - Vol 3| 2012
- 154
-
IEEE Computer Society Technical & Conference Activities Board| 2012
- i
-
Proceedings of the 2012 ASE International Conference on BioMedical Computing BioMedCom 2012 [Title page i]| 2012
- iii
-
Proceedings of the 2012 ASE International Conference on BioMedical Computing BioMedCom 2012 [Title page iii]| 2012
- iv
-
[BioMedCom 2012 Copyright notice]| 2012
- ix
-
BioMedCom 2012 Program Committee Members| 2012
- v
-
2012 ASE/IEEE International Conference on BioMedical Computing - BioMedCom 2012 - Table of contents| 2012
- viii
-
Message from the Organizing CommitteesSocialInformatics/CyberSecurity/BioMedCom 2012 Organizing Committees, et al. | 2012