Computational identification of key functional genes associated with fusarium verticillioides pathogenicity
Abstract
Index Terms
- Computational identification of key functional genes associated with fusarium verticillioides pathogenicity
Recommendations
Computational identification of functional network modules associated with the pathogenicity of Fusarium verticillioides
BCB '14: Proceedings of the 5th ACM Conference on Bioinformatics, Computational Biology, and Health InformaticsBiological functions are executed through elaborate collaboration of various biomolecules, and there has been increasing interest in the computational identification of functional modules from large-scale experimental data. In this study, we performed a ...
Computational Prediction of Pathogenic Network Modules in Fusarium verticillioides
Fusarium verticillioides is a fungal pathogen that triggers stalk rots and ear rots in maize. In this study, we performed a comparative analysis of wild type and loss-of-virulence mutant F. verticillioides co-expression networks to identify subnetwork ...
Identification of Key Genes and Pathways Associated with Chronic Obstructive Pulmonary Disease Based on Bioinformatics Analysis
BIBE2020: Proceedings of the Fourth International Conference on Biological Information and Biomedical EngineeringObjective: Chronic obstructive pulmonary disease (COPD) is recognized as a common preventable respiratory disease whose character is incompletely reversible airflow limitation. However, its specific pathogenesis is still not fully understood. Here we ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 75Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in