Author of the publication

Generation of a Compendium of Transcription Factor Cascades and Identification of Potential Therapeutic Targets using Graph Machine Learning.

, , , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SMS-based web search for low-end mobile devices., , and . MobiCom, page 125-136. ACM, (2010)Technical Report: Design, Implementation and Deployment of Intermittency-aware Cellular Edge Services for Rural areas., , , , and . CoRR, (2016)Secure rural supply chain management using low cost paper watermarking., , and . NSDR, page 19-24. ACM, (2008)Cryptagram: photo privacy for online social media., , , and . COSN, page 75-88. ACM, (2013)Extraction of (Key, Value) Pairs from Unstructured Ads., , and . AAAI Fall Symposia, AAAI Press, (2014)Packet Loss Characterization in WiFi-Based Long Distance Networks., , , , , and . INFOCOM, page 312-320. IEEE, (2007)TrickleDNS: Bootstrapping DNS security using social trust., , , and . COMSNETS, page 1-10. IEEE, (2012)SIMbaLink: towards a sustainable and feasible solar rural electrification system., , , , , , , and . ICTD, page 42:1-42:10. ACM, (2010)Reliable broadcast in unknown fixed-identity networks., , , , and . PODC, page 342-351. ACM, (2005)Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!)., , , , and . NSDI, page 127-140. USENIX, (2004)