Semantic Scholar uses AI to extract papers important to this topic.
Correct annotation metadata is critical for reproducible and accurate RNA-seq analysis. When files are shared publicly or among… Expand For the space application, error detection and correction (EDAC) technique is often adopted to protect memory cells against… Expand Number entry is a common task in many domains. In safety-critical environments such as air traffic control or on hospital wards… Expand AbstractThis new bioinformatics research bridges Genomics and Mathematics. We propose a universal “Fractal Genome Code Law”: The… Expand BackgroundOligonucleotide probes that are sequence identical may have different identifiers between manufacturers and even… Expand IP/UDP/RTP header compression [CRTP] can generate a large number of lost packets when used over links with significant error… Expand We introduce UDF Lite - a lightweight version of UDP with increased flexibility in the form of a partial checksum. It allows… Expand This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and… Expand Abstract : This report presents testing and improvements to a protocol, raync, for the synchronisation of similar data files in… Expand In this paper we describe techniques for efficient calculation of the ISO checksum which, to our knowledge, are not discussed in… Expand