Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programming security » programming secrets, programming secure, programming recursion
second microarray » exon microarray, cdna microarray, gene microarray
security program » security problems, security proofs, security proof
microarray https » microarrays https, microarray chips, microscopy https
program second » program section, progress second, programming second
programming security » programming secrets, programming secure, programming recursion
second microarray » exon microarray, cdna microarray, gene microarray
security program » security problems, security proofs, security proof
microarray https » microarrays https, microarray chips, microscopy https
program second » program section, progress second, programming second
1
Published 2008
Table of Contents:
“... for Mining Subtle Signals in Time Course Microarray Data -- A PTAS for the k-Consensus Structures Problem...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“...-learning Approach to Function Approximation -- On the Effectiveness of Gene Selection for Microarray...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“... for Microarray Data -- New Method for Dynamic Signature Verification Using Hybrid Partitioning -- New Method...”View full text
Electronic
eBook



