Author of the publication

Integration of shot-gun proteomics and bioinformatics analysis to explore plant hormone responses.

, , , and . BMC Bioinformatics, 13 (S-15): S8 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shadow attacks: automatically evading system-call-behavior based malware detection., , , , and . Journal in Computer Virology, 8 (1-2): 1-13 (2012)A secure mechanism of group communication for pervasive grid., , , and . IJAHUC, 4 (6): 344-353 (2009)Convergence analysis and application of the central force optimization algorithm., , , and . SCIENCE CHINA Information Sciences, 58 (5): 1-3 (2015)TCPBridge: A software approach to establish direct communications for NAT hosts., , , , and . AICCSA, page 247-252. IEEE Computer Society, (2008)Enzyme structure dynamics of xylanase I from Trichoderma longibrachiatum., , , , , and . BMC Bioinformatics, 11 (S-6): S12 (2010)Integration of shot-gun proteomics and bioinformatics analysis to explore plant hormone responses., , , and . BMC Bioinformatics, 13 (S-15): S8 (2012)HDX-Analyzer: a novel package for statistical analysis of protein structure dynamics., , , , , , , , and . BMC Bioinformatics, 12 (S-1): S43 (2011)Privacy-Preserving Matching Protocols for Attributes and Strings., , , , and . IACR Cryptology ePrint Archive, (2010)Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose., , , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 302-315. Springer, (2008)User Linkage Across Anonymizd Social Networks., , , and . CSoNet, volume 11280 of Lecture Notes in Computer Science, page 186-197. Springer, (2018)