منابع مشابه
Trimming
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opin...
متن کاملTRIMming p53 for ubiquitination.
T he function of the p53 tumor suppressor protein is finely tuned through a myriad of interactions with other proteins. These interactions can lead to posttranslational modifications that regulate p53 stability, DNA binding, or promoterspecific transcriptional activation. A number of p53 binding proteins serve as cofactors that participate in the recruitment of p53 to specific promoters and fac...
متن کاملNew EST Trimming Strategy
Trimming procedures are an important part of the sequence analysis pipeline in an EST Sequencing Project. In general, trimming is done in several phases, each one detecting and removing some kind of undesirable artifact, such as low quality sequence, vectors or adapters sequence, and contamination. However, this strategy often results in a phase being unable to recognize its target because part...
متن کاملTrimming for subdivision surfaces
Trimming is an important primitive operation in geometric modeling. It is also the root of many numerical and topological problems in modern NURBS based CAGD systems. In this paper we introduce a new method for trimming subdivision surfaces. It is based on the use of combined subdivision schemes to guarantee exact interpolation of trim curves. The latter ensures, for example, that if two surfac...
متن کاملTrimming Visibly Pushdown Automata
We study the problem of trimming visibly pushdown automata (VPA). We first describe a polynomial time procedure which, given a visibly pushdown automaton that accepts only well-nested words, returns an equivalent visibly pushdown automaton that is trimmed. We then show how this procedure can be lifted to the setting of arbitrary VPA. Furthermore, we present a way of building, given a VPA, an eq...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science-Business eXchange
سال: 2009
ISSN: 1945-3477
DOI: 10.1038/scibx.2009.1429