Sign up & Download
Sign in

Papers in Computer and Information Science

Miscellaneous papers in Computer and Information Science, B

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other
Papers 1 - 20 of 12,220 in Miscellaneous, B
  1. Neutralizing antibodies have been thought to be required for protection against acutely cytopathic viruses, such as the neurotropic vesicular stomatitis virus (VSV). Utilizing mice that possess B cells but lack antibodies, we show here that survival…
  2. West Nile virus (WNV) causes severe central nervous system (CNS) infection primarily in humans who are immunocompromised or elderly. In this study, we addressed the mechanism by which the immune system limits dissemination of WNV infection by…
  3. In recent years, intense research efforts have been dedicated to elucidating the pathogenic mechanisms of HIV-associated disease progression. In addition to the progressive depletion and dysfunction of CD4(+) T cells, HIV infection also leads to…
  4. Diffusion-weighted magnetic resonance imaging (DW-MRI) is a recognized tool for early detection of infarction of the human brain. DW-MRI uses the signal loss associated with the random thermal motion of water molecules in the presence of magnetic…
  5. We discuss the most important Physics thus far extracted from studies of B meson decays. Measurements of the four CP violating angles accessible in B decay are reviewed as well as direct CP violation. A detailed discussion of the measurements of the…
  6. The higher incidence of under-prepared students in the South African education institutions has a particular significance for introductory programming courses which rely heavily on the use of technological tools as components of the teaching model.…
  7. We present in this paper an efficient, flexible, and effective data structure, B*-trees for non-slicing floorplans. B*-trees are based on ordered binary trees and the admissible placement presented in [1]. Inheriting from the nice properties of…
  8. Identity theft is one of the fastest growing crimes in the nation, and phishing has been a primary tool used for this type of theft. In this paper, we present B-APT, a Bayesian anti-phishing toolbar designed to help users identify phishing Websites…
  9. CASTLE is a popular privacy preserving publishing algorithm for k-anonymizing data streams. However, the algorithm does not consider the influence of the distribution of a data stream for clustering, and besides, it has a higher information loss…
  10. The ability of B lymphocytes to capture, process and present antigens to T cells is requisite for normal humoral immune responses and contributes to the pathogenesis of both B- and T-cell-mediated autoimmune diseases. B lymphocytes preferentially…
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

Sign up today - FREE

Mendeley saves you time finding and organizing research. Learn more

  • All your research in one place
  • Add and import papers easily
  • Access it anywhere, anytime

Start using Mendeley in seconds!

Already have an account? Sign in