Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2013
DOI: 10.1145/2470654.2466208
|View full text |Cite
|
Sign up to set email alerts
|

MultiNet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…We used the Tied Diffusion through Interacting Events (TieDIE) software (Paull et al, 2013;Drake et al, 2016). The Multinet pathway database (Brown et al, 2013) together with the validated microRNA-target pairs selected by miRWALK2.0 in the previous step served as the background network of the TieDIE program. 32 membrane protein genes and 180 linker genes were selected in this step.…”
Section: Generation Of Biological Pathway Subnetwork Connecting Micromentioning
confidence: 99%
See 1 more Smart Citation
“…We used the Tied Diffusion through Interacting Events (TieDIE) software (Paull et al, 2013;Drake et al, 2016). The Multinet pathway database (Brown et al, 2013) together with the validated microRNA-target pairs selected by miRWALK2.0 in the previous step served as the background network of the TieDIE program. 32 membrane protein genes and 180 linker genes were selected in this step.…”
Section: Generation Of Biological Pathway Subnetwork Connecting Micromentioning
confidence: 99%
“…In NSCLC, it is estimated that over 40% of patients have metastases at the time of diagnosis (Waqar et al, 2018). The prognosis is poor in metastatic cases -only ∼1% of such NSCLC patients will survive five or more years (Borghaei et al, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Given this assumption, only the person him-or herself can present matching biometrics to prove his or her identity. Buhan et al [2007] suggested "SAfE," which utilizes physiological biometrics for secure pairing. They examined the use of facial features and of hand grip patterns.…”
Section: Biometricmentioning
confidence: 99%
“…The devices then exchange the snapshots, and each device extracts facial features and compares these with the stored features of its user, in order to either accept or reject the connection. Hence, only a snapshot of the registered users can associate the devices [Buhan et al 2007[Buhan et al , 2009. As an alternative to facial features, hand grip patterns were considered.…”
Section: Biometricmentioning
confidence: 99%