Inno-hep

 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
OBJECTIVE We describe and explain the development of a clinical quality database and its use for different clinical, management… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Middlemen in Limit Order Markets A limit-order market enables an early investor to trade with a late investor. But, p ublic news… (More)
  • table 6
  • table 1
  • table 2
  • figure 1
  • figure 3
Is this relevant?
2008
2008
The aim of this study was to determine hepatitis co-infection in a cohort of HIV infected patients at their inclusion in the… (More)
Is this relevant?
2008
2008
BACKGROUND/AIMS The frequency of mixed hepatitis B virus (HBV) genotypes in chronic HBV (CHB) and genotype changes during natural… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
2007
2007
A strategy combining human papillomavirus general primer (mainly the PGMY primers)-directed PCR sequencing and type-specific PCR… (More)
Is this relevant?
2007
2007
The aim of the study was to determine the prevalence and genotypes of HPV infection in laryngeal cancer specimens, normal mucosa… (More)
  • table 1
  • figure 2
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Fresh-frozen biopsies were obtained from 61 patients at diagnosis of squamous cell carcinoma of the head and neck (HNSCC) for… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Sensitive and early detection of emerging hepatitis B virus (HBV) drug resistance may not only help monitor the viral dynamics… (More)
  • table 1
  • table 2
  • figure 1
Is this relevant?
2002
2002
BACKGROUND The genotype of hepatitis C virus (HCV) is a predictor of antiviral therapeutic response. We describe an approach for… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We analyze the security of the BGP routing protocol, and iden tify a number of vulnerabilities in its design and the correspondi… (More)
  • figure 1
Is this relevant?