Author of the publication

KOBAS-i: intelligent prioritization and exploratory visualization of biological functions for gene enrichment analysis.

, , , , , , , , , , , , , , and . Nucleic Acids Res., 49 (Webserver-Issue): 317-325 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive wireless passive human detection via fine-grained physical layer information., , , , , , and . Ad Hoc Networks, (2016)High-Performance Electron Acceptor with Thienyl Side Chains for Organic Photovoltaics, , , , , , , , , and 3 other author(s). Journal of the American Chemical Society, 138 (14): 4955-4961 (2016)PMID: 27015115.The Design of Website-group for Government Based on ASP.NET., , , and . ICEE, page 717-720. IEEE Computer Society, (2010)QoS-aware Topology Discovery in Decentralized Software Defined Wireless Mesh Network (D-SDWMN) Architecture., and . CSAI/ICIMT, page 158-162. ACM, (2018)RTNF: Predictable Latency for Network Function Virtualization., , , , and . RTAS, page 368-379. IEEE, (2019)A Model for Classification of Topological Relationships Between Two Spatial Objects., , , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 723-726. Springer, (2005)An adaptive cache management approach in ICN with pre-filter queues., , , , , and . Comput. Commun., (2020)Riemannian Set-level Common-Near-Neighbor Analysis for Multiple-shot Person Re-identification., , , , and . MVA, page 9-12. (2013)ReshapeGAN: Object Reshaping by Providing A Single Reference Image., , , , , and . CoRR, (2019)EncryptGAN: Image Steganography with Domain Transform., , , , , , and . CoRR, (2019)