Author of the publication

Protein secondary structure appears to be robust under in silico evolution while protein disorder appears not to be.

, , and . Bioinformatics, 26 (5): 625-631 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protein secondary structure appears to be robust under in silico evolution while protein disorder appears not to be., , and . Bioinformatics, 26 (5): 625-631 (2010)DUKE - Distributed Usage Control Enforcement., , , and . POLICY, page 275. IEEE Computer Society, (2007)A Runtime Monitoring Environment for Mobile Java., , , and . ICST Workshops, page 270-278. IEEE Computer Society, (2008)Subjective quality assessment for multiplayer real-time games., , , and . NETGAMES, page 74-78. ACM, (2002)Homology-based inference sets the bar high for protein function prediction., , , , , , , , , and 10 other author(s). BMC Bioinformatics, 14 (S-3): S7 (2013)Enhancing Java ME Security Support with Resource Usage Monitoring., , , , and . ERCIM News, (2008)SNPdbe: constructing an nsSNP functional impacts database., , , and . Bioinformatics, 28 (4): 601-602 (2012)A Policy Language for Distributed Usage Control., , , , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 531-546. Springer, (2007)Generic accounting configuration management for heterogeneous mobile networks., , , , and . WMASH, page 46-55. ACM, (2005)Transparent Logging with Hyperledger Fabric., and . IEEE ICBC, page 65-69. IEEE, (2019)