Results 1 - 10
of
1,195
The probability of duplicate gene preservation by subfunctionalization.
- Genetics
, 2000
"... ABSTRACT It has often been argued that gene-duplication events are most commonly followed by a mutational event that silences one member of the pair, while on rare occasions both members of the pair are preserved as one acquires a mutation with a beneficial function and the other retains the origin ..."
Abstract
-
Cited by 261 (2 self)
- Add to MetaCart
the probability of preservation. The model proposed herein leads to quantitative predictions that are consistent with observations on the frequency of long-term duplicate gene preservation and with observations that indicate that a common fate of the members of duplicate-gene pairs is the partitioning of tissue
On the reduction of broadcast redundancy in mobile ad hoc networks
"... Abst rac t- Flooding in mobile ad hoc networks has poor scalability as it leads to serious redundancy, contention and collision. In this paper, we propose an efficient approach to reduce the broadcast redundancy. In our approach, local topology information and the statistical information about the d ..."
Abstract
-
Cited by 241 (0 self)
- Add to MetaCart
Abst rac t- Flooding in mobile ad hoc networks has poor scalability as it leads to serious redundancy, contention and collision. In this paper, we propose an efficient approach to reduce the broadcast redundancy. In our approach, local topology information and the statistical information about
Evolving protein interaction networks through gene duplication
- J. Theor. Biol
"... The topology of the proteome map revealed by recent large-scale hybridization methods has shown that the distribution of protein-protein interactions is highly heterogeneous, with many proteins having few links while a few of them are heavily connected. This particular topology is shared by other ce ..."
Abstract
-
Cited by 86 (2 self)
- Add to MetaCart
counterparts. The model is based on gene duplication plus re-wiring of the newly created genes. The statistical features displayed by the proteome of well-known organisms are reproduced, suggesting that the overall topology of the protein maps naturally emerges from the two leading mechanisms considered
Archeology of code duplication: Recovering duplication chains from small duplication fragments
- In Proc. 7 th Int’l. Symposium on Symbolic and Numeric Algorithms for Scientific Computing
, 2005
"... Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions and tools that can automatically find duplicated blocks of code. However, duplicated fragments rarely remain identical a ..."
Abstract
-
Cited by 22 (1 self)
- Add to MetaCart
-studies and discussing some relevant findings. By recovering such duplication chains, the maintenance engineer is provided with additional cases of duplication that can lead to relevant refactorings, and which are usually missed by other detection methods.
The altered evolutionary trajectories of gene duplicates
- Trends Genet
, 2004
"... Gene duplication is widely regarded as the predominant mechanism by which genes with new functions and associated phenotypic novelties arise. However, the mutational events and population-genetic mechanisms that lead to the short-term preservation of duplicate genes are not necessarily the same as t ..."
Abstract
-
Cited by 51 (1 self)
- Add to MetaCart
Gene duplication is widely regarded as the predominant mechanism by which genes with new functions and associated phenotypic novelties arise. However, the mutational events and population-genetic mechanisms that lead to the short-term preservation of duplicate genes are not necessarily the same
Weak Duplicate Address Detection in Mobile Ad Hoc Networks
- in Proc. of ACM MobiHoc 2002
, 2002
"... Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirable. In traditional networks, such dynamic address assignment is often performed using the Dynamic Host Configuration Proto ..."
Abstract
-
Cited by 97 (1 self)
- Add to MetaCart
in presence of partitions. In networks where message delays cannot be bounded, use of timeouts can lead to unreliability. Therefore, we propose an alternative approach (which can be used in conjunction with previously proposed schemes). We refer to the proposed approach as "weak" duplicate address
Coarse Graining in an Evolutionary Algorithm with Recombination, Duplication and Inversion
- In CEC-2005
, 2005
"... A generalised form of recombination, wherein an offspring can be formed from any of the genetic material of the parents, is analysed in the context of a twolocus recombinative GA. A complete, exact solution, is derived, showing how the dynamical behaviour is radically different to that of homologous ..."
Abstract
-
Cited by 6 (5 self)
- Add to MetaCart
to that of homologous crossover. Inversion is shown to potentially introduce oscillations in the dynamics, while gene duplication leads to an asymmetry between homogeneous and heterogeneous strings. All non-homologous operators lead to allele "diffusion" along the chromosome. We discuss how inferences from
Phylogenetic timing of the fish‐ specific genome duplication correlates with the diversification of teleost fish
- J. Mol. Evol
, 2004
"... Abstract. For many genes, ray-finned fish (Actinopterygii) have two paralogous copies, where only one ortholog is present in tetrapods. The discovery of an additional, almost-complete set of Hox clusters in teleosts (zebrafish, pufferfish, medaka, and cichlid) but not in basal actinopterygian lineag ..."
Abstract
-
Cited by 84 (5 self)
- Add to MetaCart
copy is found in tetrapods. Individual gene trees for these three genes and a concatenated dataset support the hypothesis that the fish-specific genome duplication event took place after the split of the Acipenseriformes and the Semionotiformes from the lineage leading to teleost fish but before
DES and Differential Power Analysis - The "Duplication" Method
, 1999
"... . Paul Kocher recently developped attacks based on the electric consumption of chips that perform cryptographic computations. Among those attacks, the \Dierential Power Analysis" (DPA) is probably one of the most impressive and most dicult to avoid. In this paper, we present several ideas to re ..."
Abstract
-
Cited by 86 (1 self)
- Add to MetaCart
to resist this type of attack, and in particular we develop one of them which leads, interestingly, to rather precise mathematical analysis. Thus we show that it is possible to build an implementation that is provably DPA-resistant, in a \local" and restricted way (i.e. when { given a chip with a xed
Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments
"... Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions and tools that can automatically find duplicated blocks of code. However, duplicated fragments rarely remain identical a ..."
Abstract
- Add to MetaCart
-studies and discussing some relevant findings. By recovering such duplication chains, the maintenance engineer is provided with additional cases of duplication that can lead to relevant refactorings, and which are usually missed by other detection methods.
Results 1 - 10
of
1,195