Author of the publication

Initial sequencing and comparative analysis of the mouse genome

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . Nature, (December 2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer discipline and the design practice shaping our future : Aart Bijl Edinburgh University Press (1990) 240 pp.. Comput. Aided Des., 23 (6): 462 (1991)Initial sequencing and comparative analysis of the mouse genome, , , , , , , , , and 212 other author(s). Nature, (December 2002)The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users., , and . HICSS, page 383. IEEE Computer Society, (2008)A second generation human haplotype map of over 3.1 million SNPs, , , , , , , , , and 241 other author(s). Nature, 449 (7164): 851-861 (October 2007)BEERE: a web server for biomedical entity expansion, ranking and explorations., , , and . Nucleic Acids Res., 47 (Webserver-Issue): W578-W586 (2019)Statistical Enrichment Analysis of Samples: A General-Purpose Tool to Annotate Metadata Neighborhoods of Biological Samples., , , , and . Frontiers Big Data, (2021)Will HITECH Heal Patient Data Hemorrhages?, and . HICSS, page 1-10. IEEE Computer Society, (2011)The DNA sequence and biological annotation of human chromosome 1., , , , , , , , , and 169 other author(s). Nature, 441 (7091): 315-21 (2006)Why file sharing networks are dangerous?, , and . Commun. ACM, 52 (2): 134-138 (2009)