Author of the publication

Novel metrics to measure coverage in whole exome sequencing datasets reveal local and global non-uniformity

, , , , and . Scientific Reports, 7 (1): 885-- (2017)
DOI: 10.1038/s41598-017-01005-x

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implication of the Slow-5 Oscillations in the Disruption of the Default-Mode Network in Healthy Aging and Stroke., , , , , , , , and . Brain Connect., 6 (6): 482-495 (2016)Research Quest: Six Design Boxes and Six Iterations towards a Game to Teach Critical Thinking., , , , and . FDG, Society for the Advancement of the Science of Digital Games, (2015)Robust Action in Cross-Platform Communication by Ideological Groups: The Dark Side of Digital Activism., , , , , and . AMCIS, Association for Information Systems, (2021)Research Quest: Critical Thinking through Video Games and Interdisciplinary Collaboration., , , , and . FDG, Society for the Advancement of the Science of Digital Games, (2015)Novel metrics to measure coverage in whole exome sequencing datasets reveal local and global non-uniformity, , , , and . Scientific Reports, 7 (1): 885-- (2017)Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior., , , , , , and . IEEE Intelligent Systems, 20 (5): 36-43 (2005)Is Interactional Dissynchrony a Clue to Deception? Insights From Automated Analysis of Nonverbal Visual Cues., , , , , , , , and . IEEE Trans. Cybern., 45 (3): 506-520 (2015)Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance., , , , and . Inf. Syst. Res., 25 (2): 385-400 (2014)Computer-aided Credibility Assessment by Novice Lie-Catchers., , and . AMCIS, page 159. Association for Information Systems, (2007)Phishing susceptibility across industries: The differential impact of influence techniques., , and . Comput. Secur., (December 2023)