• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,195
Next 10 →

The probability of duplicate gene preservation by subfunctionalization.

by Michael Lynch , Allan Force - Genetics , 2000
"... ABSTRACT It has often been argued that gene-duplication events are most commonly followed by a mutational event that silences one member of the pair, while on rare occasions both members of the pair are preserved as one acquires a mutation with a beneficial function and the other retains the origin ..."
Abstract - Cited by 261 (2 self) - Add to MetaCart
the probability of preservation. The model proposed herein leads to quantitative predictions that are consistent with observations on the frequency of long-term duplicate gene preservation and with observations that indicate that a common fate of the members of duplicate-gene pairs is the partitioning of tissue

On the reduction of broadcast redundancy in mobile ad hoc networks

by Wei Peng, Xi-cheng Lu
"... Abst rac t- Flooding in mobile ad hoc networks has poor scalability as it leads to serious redundancy, contention and collision. In this paper, we propose an efficient approach to reduce the broadcast redundancy. In our approach, local topology information and the statistical information about the d ..."
Abstract - Cited by 241 (0 self) - Add to MetaCart
Abst rac t- Flooding in mobile ad hoc networks has poor scalability as it leads to serious redundancy, contention and collision. In this paper, we propose an efficient approach to reduce the broadcast redundancy. In our approach, local topology information and the statistical information about

Evolving protein interaction networks through gene duplication

by Romualdo Pastor-satorras, Eric Smith, Ricard V. Solé - J. Theor. Biol
"... The topology of the proteome map revealed by recent large-scale hybridization methods has shown that the distribution of protein-protein interactions is highly heterogeneous, with many proteins having few links while a few of them are heavily connected. This particular topology is shared by other ce ..."
Abstract - Cited by 86 (2 self) - Add to MetaCart
counterparts. The model is based on gene duplication plus re-wiring of the newly created genes. The statistical features displayed by the proteome of well-known organisms are reproduced, suggesting that the overall topology of the protein maps naturally emerges from the two leading mechanisms considered

Archeology of code duplication: Recovering duplication chains from small duplication fragments

by Richard Wettel, Radu Marinescu - In Proc. 7 th Int’l. Symposium on Symbolic and Numeric Algorithms for Scientific Computing , 2005
"... Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions and tools that can automatically find duplicated blocks of code. However, duplicated fragments rarely remain identical a ..."
Abstract - Cited by 22 (1 self) - Add to MetaCart
-studies and discussing some relevant findings. By recovering such duplication chains, the maintenance engineer is provided with additional cases of duplication that can lead to relevant refactorings, and which are usually missed by other detection methods.

The altered evolutionary trajectories of gene duplicates

by Michael Lynch, Vaishali Katju - Trends Genet , 2004
"... Gene duplication is widely regarded as the predominant mechanism by which genes with new functions and associated phenotypic novelties arise. However, the mutational events and population-genetic mechanisms that lead to the short-term preservation of duplicate genes are not necessarily the same as t ..."
Abstract - Cited by 51 (1 self) - Add to MetaCart
Gene duplication is widely regarded as the predominant mechanism by which genes with new functions and associated phenotypic novelties arise. However, the mutational events and population-genetic mechanisms that lead to the short-term preservation of duplicate genes are not necessarily the same

Weak Duplicate Address Detection in Mobile Ad Hoc Networks

by Nitin H. Vaidya - in Proc. of ACM MobiHoc 2002 , 2002
"... Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirable. In traditional networks, such dynamic address assignment is often performed using the Dynamic Host Configuration Proto ..."
Abstract - Cited by 97 (1 self) - Add to MetaCart
in presence of partitions. In networks where message delays cannot be bounded, use of timeouts can lead to unreliability. Therefore, we propose an alternative approach (which can be used in conjunction with previously proposed schemes). We refer to the proposed approach as "weak" duplicate address

Coarse Graining in an Evolutionary Algorithm with Recombination, Duplication and Inversion

by C.R. Stephens, R. Poli - In CEC-2005 , 2005
"... A generalised form of recombination, wherein an offspring can be formed from any of the genetic material of the parents, is analysed in the context of a twolocus recombinative GA. A complete, exact solution, is derived, showing how the dynamical behaviour is radically different to that of homologous ..."
Abstract - Cited by 6 (5 self) - Add to MetaCart
to that of homologous crossover. Inversion is shown to potentially introduce oscillations in the dynamics, while gene duplication leads to an asymmetry between homogeneous and heterogeneous strings. All non-homologous operators lead to allele "diffusion" along the chromosome. We discuss how inferences from

Phylogenetic timing of the fish‐ specific genome duplication correlates with the diversification of teleost fish

by Simone Hoegg, Henner Brinkmann, John S. Taylor, Axel Meyer - J. Mol. Evol , 2004
"... Abstract. For many genes, ray-finned fish (Actinopterygii) have two paralogous copies, where only one ortholog is present in tetrapods. The discovery of an additional, almost-complete set of Hox clusters in teleosts (zebrafish, pufferfish, medaka, and cichlid) but not in basal actinopterygian lineag ..."
Abstract - Cited by 84 (5 self) - Add to MetaCart
copy is found in tetrapods. Individual gene trees for these three genes and a concatenated dataset support the hypothesis that the fish-specific genome duplication event took place after the split of the Acipenseriformes and the Semionotiformes from the lineage leading to teleost fish but before

DES and Differential Power Analysis - The "Duplication" Method

by Louis Goubin, Jacques Patarin, Bull Smartcards , 1999
"... . Paul Kocher recently developped attacks based on the electric consumption of chips that perform cryptographic computations. Among those attacks, the \Dierential Power Analysis" (DPA) is probably one of the most impressive and most dicult to avoid. In this paper, we present several ideas to re ..."
Abstract - Cited by 86 (1 self) - Add to MetaCart
to resist this type of attack, and in particular we develop one of them which leads, interestingly, to rather precise mathematical analysis. Thus we show that it is possible to build an implementation that is provably DPA-resistant, in a \local" and restricted way (i.e. when { given a chip with a xed

Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments

by unknown authors
"... Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions and tools that can automatically find duplicated blocks of code. However, duplicated fragments rarely remain identical a ..."
Abstract - Add to MetaCart
-studies and discussing some relevant findings. By recovering such duplication chains, the maintenance engineer is provided with additional cases of duplication that can lead to relevant refactorings, and which are usually missed by other detection methods.
Next 10 →
Results 1 - 10 of 1,195
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University