Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4
hits: 39
1.
  • Integrated Analysis of TP53... Integrated Analysis of TP53 Gene and Pathway Alterations in The Cancer Genome Atlas
    Donehower, Lawrence A.; Soussi, Thierry; Korkut, Anil ... Cell reports, 07/2019, Volume: 28, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    The TP53 tumor suppressor gene is frequently mutated in human cancers. An analysis of five data platforms in 10,225 patient samples from 32 cancers reported by The Cancer Genome Atlas (TCGA) enables ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
2.
  • Multiplatform-based molecul... Multiplatform-based molecular subtypes of non-small-cell lung cancer
    Chen, F; Zhang, Y; Parra, E ... Oncogene, 03/2017, Volume: 36, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Non-small-cell lung cancer (NSCLC) demonstrates remarkable molecular diversity. With the completion of The Cancer Genome Atlas (TCGA), there is opportunity for systematic analyses of the entire TCGA ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
3.
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
4.
Full text

PDF
5.
  • Integrated genomic analyses... Integrated genomic analyses of ovarian carcinoma
    Cancer Genome Atlas Research Network, The; Neuvial, Pierre Nature, 06/2011, Volume: 474, Issue: 7353
    Journal Article
    Peer reviewed
    Open access

    A catalogue of molecular aberrations that cause ovarian cancer is critical for developing and deploying therapies that will improve patients' lives. The Cancer Genome Atlas project has analysed ...
Full text
Available for: DOBA, IJS, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
6.
  • Before and After: Compariso... Before and After: Comparison of Legacy and Harmonized TCGA Genomic Data Commons’ Data
    Gao, Galen F.; Parker, Joel S.; Reynolds, Sheila M. ... Cell systems, 07/2019, Volume: 9, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    We present a systematic analysis of the effects of synchronizing a large-scale, deeply characterized, multi-omic dataset to the current human reference genome, using updated software, pipelines, and ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
7.
  • Abstract P1-07-01: A pan-ca... Abstract P1-07-01: A pan-cancer perspective of functional proteomics provides novel information content for uncommon breast cancer subtypes
    Zhao, W; Li, J; Lu, Y ... Cancer research (Chicago, Ill.), 02/2017, Volume: 77, Issue: 4_Supplement
    Journal Article
    Peer reviewed

    Abstract Cancer cell lines (CCLs) serve as models to study the functional consequences of the genomic lesions in patients and as screening platforms for prediction of drug response. While genomic and ...
Full text
Available for: CMK, UL
8.
  • Elliptic curve cryptosystem... Elliptic curve cryptosystem and its applications
    Raju, G.V.S.; Akbani, R. SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483), 2003, Volume: 2
    Conference Proceeding

    The goal of this research is to develop a basis for utilizing efficient encryption schemes in wireless communications and in devices with low computing power and resources. Elliptic curve ...
Full text
Available for: IJS, NUK, UL, UM
9.
  • A Hybrid Trust Management S... A Hybrid Trust Management System for automated fine-grained access control
    Akbani, R.; Korkmaz, T.; Raju, G.V.S. MILCOM 2009 - 2009 IEEE Military Communications Conference, 2009-Oct.
    Conference Proceeding

    An organization consists of many resources and entities who want to access those resources. Not all entities are granted full access rights to every resource, so there must be a Trust Management ...
Full text
Available for: IJS, NUK, UL, UM
10.
  • Authentication in Wireless Networks
    Raju, G.V.S.; Akbani, R. 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007-Jan.
    Conference Proceeding

    With the explosive growth in the adoption of wireless networks in the recent years, the limitations of wireless security have become a topic of wide spread concern. It is easy for hackers to enter or ...
Full text
Available for: IJS, NUK, UL, UM
1 2 3 4
hits: 39

Load filters