-
5
-
-
84883069162
-
-
AWS Import/Export. http://aws.amazon.com/importexport/.
-
AWS Import/Export
-
-
-
7
-
-
85180743821
-
-
Crypto++ 5.6.0 Benchmarks. http://www.cryptopp. com/benchmarks.html.
-
-
-
-
10
-
-
85180782107
-
-
SecureGenome. http://securegenome.icsi. berkeley.edu/securegenome/.
-
SecureGenome
-
-
-
13
-
-
85180801600
-
-
Copy Number Variation. http://www.nature.com/scitable/topicpage/copy-number-variation-445, 2008.
-
(2008)
Copy Number Variation
-
-
-
15
-
-
0025183708
-
Basic local alignment search tool
-
October
-
S. F. Altschul, W. Gish, W. Miller, E. W. Myers, and D. J. Lipman. Basic local alignment search tool. Journal of molecular biology, 215(3):403-410, October 1990.
-
(1990)
Journal of molecular biology
, vol.215
, Issue.3
, pp. 403-410
-
-
Altschul, S. F.1
Gish, W.2
Miller, W.3
Myers, E. W.4
Lipman, D. J.5
-
16
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
New York, NY, USA, ACM
-
M. J. Atallah and K. B. Frikken. Securely outsourcing linear algebra computations. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pages 48-59, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10
, pp. 48-59
-
-
Atallah, M. J.1
Frikken, K. B.2
-
17
-
-
1642327704
-
Secure and private sequence comparisons
-
New York, NY, USA, ACM
-
M. J. Atallah, F. Kerschbaum, and W. Du. Secure and private sequence comparisons. In Proceedings of the 2003 ACM workshop on Privacy in the electronic society, WPES '03, pages 39-44, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 2003 ACM workshop on Privacy in the electronic society, WPES '03
, pp. 39-44
-
-
Atallah, M. J.1
Kerschbaum, F.2
Du, W.3
-
18
-
-
27644520949
-
Secure outsourcing of sequence comparisons
-
October
-
M. J. Atallah and J. Li. Secure outsourcing of sequence comparisons. Int. J. Inf. Secur., 4:277-287, October 2005.
-
(2005)
Int. J. Inf. Secur
, vol.4
, pp. 277-287
-
-
Atallah, M. J.1
Li, J.2
-
19
-
-
85029488480
-
Fast and practical approximate string matching
-
London, UK, Springer-Verlag
-
R. A. Baeza-Yates and C. H. Perleberg. Fast and practical approximate string matching. In Proceedings of the Third Annual Symposium on Combinatorial Pattern Matching, CPM '92, pages 185-192, London, UK, 1992. Springer-Verlag.
-
(1992)
Proceedings of the Third Annual Symposium on Combinatorial Pattern Matching, CPM '92
, pp. 185-192
-
-
Baeza-Yates, R. A.1
Perleberg, C. H.2
-
20
-
-
77958487669
-
Secure outsourcing of dna searching via finite automata
-
S. Foresti and S. Jajodia, editors, pages Springer
-
M. Blanton and M. Aliasgari. Secure outsourcing of dna searching via finite automata. In S. Foresti and S. Jajodia, editors, DBSec, volume 6166 of Lecture Notes in Computer Science, pages 49-64. Springer, 2010.
-
(2010)
DBSec, volume 6166 of Lecture Notes in Computer Science
, pp. 49-64
-
-
Blanton, M.1
Aliasgari, M.2
-
21
-
-
77958496068
-
-
Technical Report Report 2008/203, ACR Cryptology ePrint Archive
-
F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls. Privacy-preserving matching of dna profiles. Technical Report Report 2008/203, ACR Cryptology ePrint Archive, 2008.
-
(2008)
Privacy-preserving matching of dna profiles
-
-
Bruekers, F.1
Katzenbeisser, S.2
Kursawe, K.3
Tuyls, P.4
-
22
-
-
77950461601
-
Origins and functional impact of copy number variation in the human genome
-
Oct
-
D. F. Conrad, D. Pinto, R. Redon, L. Feuk, O. Gokcumen, Y. Zhang, J. Aerts, T. D. Andrews, C. Barnes, P. Campbell, T. Fitzgerald, M. Hu, C. H. Ihm, K. Kristiansson, D. G. MacArthur, J. R. MacDonald, I. Onyiah, A. W. Pang, S. Robson, K. Stirrups, A. Valsesia, K. Walter, J. Wei, C. Tyler-Smith, N. P. Carter, C. Lee, S. W. Scherer, and M. E. Hurles. Origins and functional impact of copy number variation in the human genome. Nature, 464(7289):704-712, Oct. 2009.
-
(2009)
Nature
, vol.464
, Issue.7289
, pp. 704-712
-
-
Conrad, D. F.1
Pinto, D.2
Redon, R.3
Feuk, L.4
Gokcumen, O.5
Zhang, Y.6
Aerts, J.7
Andrews, T. D.8
Barnes, C.9
Campbell, P.10
Fitzgerald, T.11
Hu, M.12
Ihm, C. H.13
Kristiansson, K.14
MacArthur, D. G.15
MacDonald, J. R.16
Onyiah, I.17
Pang, A. W.18
Robson, S.19
Stirrups, K.20
Valsesia, A.21
Walter, K.22
Wei, J.23
Tyler-Smith, C.24
Carter, N. P.25
Lee, C.26
Scherer, S. W.27
Hurles, M. E.28
more..
-
23
-
-
37549003336
-
Mapreduce: simplified data processing on large clusters
-
January
-
J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51:107-113, January 2008.
-
(2008)
Commun. ACM
, vol.51
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
24
-
-
84883298285
-
P4p: Practical large-scale privacy-preserving distributed computation robust against malicious users abstract
-
Washington, DC, August
-
Y. Duan, N. Youdao, J. Canny, and J. Zhan. P4p: Practical large-scale privacy-preserving distributed computation robust against malicious users abstract. In Proceedings of the 19th USENIX Security Symposium, Washington, DC, August 2010.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Duan, Y.1
Youdao, N.2
Canny, J.3
Zhan, J.4
-
25
-
-
33746335051
-
Differential privacy
-
Springer
-
C. Dwork. Differential privacy. In in ICALP, pages 1-12. Springer, 2006.
-
(2006)
ICALP
, pp. 1-12
-
-
Dwork, C.1
-
26
-
-
80755172972
-
Cloud computing fundamentals
-
B. Furht and A. Escalante, editors, pages Springer US
-
B. Furht. Cloud computing fundamentals. In B. Furht and A. Escalante, editors, Handbook of Cloud Computing, pages 3-19. Springer US, 2010.
-
(2010)
Handbook of Cloud Computing
, pp. 3-19
-
-
Furht, B.1
-
29
-
-
77955163329
-
mrsFAST: a cacheoblivious algorithm for short-read mapping
-
Aug
-
F. Hach, F. Hormozdiari, C. Alkan, F. Hormozdiari, I. Birol, E. E. Eichler, and S. C. Sahinalp. mrsFAST: a cacheoblivious algorithm for short-read mapping. Nature Methods, 7(8):576-577, Aug. 2010.
-
(2010)
Nature Methods
, vol.7
, Issue.8
, pp. 576-577
-
-
Hach, F.1
Hormozdiari, F.2
Alkan, C.3
Hormozdiari, F.4
Birol, I.5
Eichler, E. E.6
Sahinalp, S. C.7
-
30
-
-
85026256688
-
Assessing the Privacy Risks of Data Sharing in Genomics
-
P
-
Heeney C, Hawkins N, de Vries J, Boddington, and P, Kaye J. Assessing the Privacy Risks of Data Sharing in Genomics. Public Health Genomics, 2010.
-
(2010)
Public Health Genomics
-
-
Heeney, C1
Hawkins, N2
de Vries, J3
Boddington4
Kaye, J.5
-
31
-
-
24144493423
-
How to securely outsource cryptographic computations
-
J. Kilian, editor, pages Springer Berlin/Heidelberg
-
S. Hohenberger and A. Lysyanskaya. How to securely outsource cryptographic computations. In J. Kilian, editor, Theory of Cryptography, volume 3378 of Lecture Notes in Computer Science, pages 264-282. Springer Berlin/Heidelberg, 2005.
-
(2005)
Theory of Cryptography, volume 3378 of Lecture Notes in Computer Science
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
32
-
-
50849101381
-
Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays
-
N. Homer, S. Szelinger, M. Redman, D. Duggan, W. Tembe, J. Muehling, J. V. Pearson, D. A. Stephan, S. F. Nelson, and D. W. Craig. Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genet, 4(8):e1000167+, 2008.
-
(2008)
PLoS Genet
, vol.4
, Issue.8
, pp. e1000167
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J. V.7
Stephan, D. A.8
Nelson, S. F.9
Craig, D. W.10
-
33
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
San Francisco, CA, August
-
Y. Huang, D. Evans, J. Katz, and L. Malka. Faster secure two-party computation using garbled circuits. In Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, August 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
34
-
-
70350632730
-
A new statistic and its power to infer membership in a genomewide association study using genotype frequencies
-
K. B. Jacobs, M. Yeager, S. Wacholder, D. Craig, P. Kraft, D. J. Hunter, J. Paschal, T. A. Manolio, M. Tucker, R. N. Hoover, G. D. Thomas, S. J. Chanock, and N. Chatterjee. A new statistic and its power to infer membership in a genomewide association study using genotype frequencies. Nature Genetics, 41(11):1253-1257, 2009.
-
(2009)
Nature Genetics
, vol.41
, Issue.11
, pp. 1253-1257
-
-
Jacobs, K. B.1
Yeager, M.2
Wacholder, S.3
Craig, D.4
Kraft, P.5
Hunter, D. J.6
Paschal, J.7
Manolio, T. A.8
Tucker, M.9
Hoover, R. N.10
Thomas, G. D.11
Chanock, S. J.12
Chatterjee, N.13
-
35
-
-
50249177701
-
Towards practical privacy for genomic computation
-
0
-
S. Jha, L. Kruger, and V. Shmatikov. Towards practical privacy for genomic computation. Security and Privacy, IEEE Symposium on, 0:216-230, 2008.
-
(2008)
Security and Privacy, IEEE Symposium on
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
36
-
-
0036226603
-
BLAT: The BLAST-Like Alignment Tool
-
April
-
W. J. Kent. BLAT: The BLAST-Like Alignment Tool. Genome Research, 12(4):656-664, April 2002.
-
(2002)
Genome Research
, vol.12
, Issue.4
, pp. 656-664
-
-
Kent, W. J.1
-
37
-
-
62349130698
-
Ultrafast and memory-efficient alignment of short dna sequences to the human genome
-
B. Langmead, C. Trapnell, M. Pop, and S. Salzberg. Ultrafast and memory-efficient alignment of short dna sequences to the human genome. Genome Biology, 10(3):R25, 2009.
-
(2009)
Genome Biology
, vol.10
, Issue.3
, pp. R25
-
-
Langmead, B.1
Trapnell, C.2
Pop, M.3
Salzberg, S.4
-
38
-
-
77957272611
-
A survey of sequence alignment algorithms for next-generation sequencing
-
September
-
H. Li and N. Homer. A survey of sequence alignment algorithms for next-generation sequencing. Briefings in Bioinformatics, 11(5):473-483, September 2010.
-
(2010)
Briefings in Bioinformatics
, vol.11
, Issue.5
, pp. 473-483
-
-
Li, H.1
Homer, N.2
-
39
-
-
42349088372
-
From genetic privacy to open consent
-
May
-
J. E. Lunshof, R. Chadwick, D. B. Vorhaus, and G. M. Church. From genetic privacy to open consent. Nature reviews. Genetics, 9(5):406-411, May 2008.
-
(2008)
Nature reviews. Genetics
, vol.9
, Issue.5
, pp. 406-411
-
-
Lunshof, J. E.1
Chadwick, R.2
Vorhaus, D. B.3
Church, G. M.4
-
40
-
-
39649117755
-
The impact of next-generation sequencing technology on genetics
-
E. R. Mardis. The impact of next-generation sequencing technology on genetics. Trends in Genetics, 24(3):133-141, 2008.
-
(2008)
Trends in Genetics
, vol.24
, Issue.3
, pp. 133-141
-
-
Mardis, E. R.1
-
41
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
London, UK, Springer-Verlag
-
T. Matsumoto, K. Kato, and H. Imai. Speeding up secret computations with insecure auxiliary devices. In Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology, pages 497-506, London, UK, 1990. Springer-Verlag.
-
(1990)
Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
42
-
-
34347353237
-
Copy-number variation and association studies of human disease
-
(Suppl), July
-
S. A. McCarroll and D. M. Altshuler. Copy-number variation and association studies of human disease. Nature genetics, 39(7 Suppl), July 2007.
-
(2007)
Nature genetics
, vol.39
, Issue.7
-
-
McCarroll, S. A.1
Altshuler, D. M.2
-
45
-
-
77950251400
-
A human gut microbial gene catalogue established by metagenomic sequencing
-
March
-
J. e. a. Qin. A human gut microbial gene catalogue established by metagenomic sequencing. Nature, 464(7285):59-65, March 2010.
-
(2010)
Nature
, vol.464
, Issue.7285
, pp. 59-65
-
-
Qin, J. e. a.1
-
46
-
-
69349086735
-
Genomic privacy and limits of individual detection in a pool
-
S. Sankararaman, G. Obozinski, M. I. Jordan, and E. Halperin. Genomic privacy and limits of individual detection in a pool. Nat Genet, 41(9):965-7, 2009.
-
(2009)
Nat Genet
, vol.41
, Issue.9
, pp. 965-967
-
-
Sankararaman, S.1
Obozinski, G.2
Jordan, M. I.3
Halperin, E.4
-
47
-
-
65649120715
-
CloudBurst: highly sensitive read mapping with MapReduce
-
M. C. Schatz. CloudBurst: highly sensitive read mapping with MapReduce. Bioinformatics, 25(11):1363-1369, 2009.
-
(2009)
Bioinformatics
, vol.25
, Issue.11
, pp. 1363-1369
-
-
Schatz, M. C.1
-
48
-
-
68649101805
-
Common vs. rare allele hypotheses for complex diseases
-
June
-
N. J. Schork, S. S. Murray, K. A. Frazer, and E. J. Topol. Common vs. rare allele hypotheses for complex diseases. Current opinion in genetics & development, 19(3):212-219, June 2009.
-
(2009)
Current opinion in genetics & development
, vol.19
, Issue.3
, pp. 212-219
-
-
Schork, N. J.1
Murray, S. S.2
Frazer, K. A.3
Topol, E. J.4
-
49
-
-
37749031255
-
Next-generation sequencing transforms today's biology
-
December
-
S. C. Schuster. Next-generation sequencing transforms today's biology. Nature Methods, 5(1):16-18, December 2007.
-
(2007)
Nature Methods
, vol.5
, Issue.1
, pp. 16-18
-
-
Schuster, S. C.1
-
50
-
-
41249096306
-
Using quality scores and longer reads improves accuracy of solexa read mapping
-
A. Smith, Z. Xuan, and M. Zhang. Using quality scores and longer reads improves accuracy of solexa read mapping. BMC Bioinformatics, 9(1):128, 2008.
-
(2008)
BMC Bioinformatics
, vol.9
, Issue.1
, pp. 128
-
-
Smith, A.1
Xuan, Z.2
Zhang, M.3
-
51
-
-
70350697851
-
Updates to the RMAP short-read mapping software
-
A. D. Smith, W.-Y. Chung, E. Hodges, J. Kendall, G. Hannon, J. Hicks, Z. Xuan, and M. Q. Zhang. Updates to the RMAP short-read mapping software. Bioinformatics, 25(21):2841-2842, 2009.
-
(2009)
Bioinformatics
, vol.25
, Issue.21
, pp. 2841-2842
-
-
Smith, A. D.1
Chung, W.-Y.2
Hodges, E.3
Kendall, J.4
Hannon, G.5
Hicks, J.6
Xuan, Z.7
Zhang, M. Q.8
-
52
-
-
77954526823
-
The case for cloud computing in genome informatics
-
May
-
L. Stein. The case for cloud computing in genome informatics. Genome Biology, 11(5):207+, May 2010.
-
(2010)
Genome Biology
, vol.11
, Issue.5
, pp. 207
-
-
Stein, L.1
-
53
-
-
85129493630
-
Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm
-
The Internet Society
-
D. Szajda, M. Pohl, J. Owen, and B. G. Lawson. Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm. In NDSS. The Internet Society, 2006.
-
(2006)
NDSS
-
-
Szajda, D.1
Pohl, M.2
Owen, J.3
Lawson, B. G.4
-
54
-
-
66149192669
-
How to map billions of short reads onto genomes
-
May
-
C. Trapnell and S. L. Salzberg. How to map billions of short reads onto genomes. Nature biotechnology, 27(5):455-457, May 2009.
-
(2009)
Nature biotechnology
, vol.27
, Issue.5
, pp. 455-457
-
-
Trapnell, C.1
Salzberg, S. L.2
-
55
-
-
57049083569
-
Privacy preserving error resilient dna searching through oblivious automata
-
New York, NY, USA, ACM
-
J. R. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik. Privacy preserving error resilient dna searching through oblivious automata. In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, pages 519-528, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM conference on Computer and communications security, CCS '07
, pp. 519-528
-
-
Troncoso-Pastoriza, J. R.1
Katzenbeisser, S.2
Celik, M.3
-
56
-
-
74049130896
-
Learning your identity and disease from research papers: Information leaks in genome wide association study
-
New York, NY, USA, ACM
-
R. Wang, Y. F. Li, X. Wang, H. Tang, and X. Zhou. Learning your identity and disease from research papers: Information leaks in genome wide association study. In CCS '09: Proceedings of the 15th ACM conference on Computer and communications security, pages 534-544, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 15th ACM conference on Computer and communications security
, pp. 534-544
-
-
Wang, R.1
Li, Y. F.2
Wang, X.3
Tang, H.4
Zhou, X.5
-
57
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
New York, NY, USA, ACM
-
R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 338-347, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM conference on Computer and communications security
, pp. 338-347
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M. K.5
Dong, Z.6
|