fotofotofotofotofoto


immagine esempio

Multi-omic Data Integration

AUTORI: PAOLO TIERI,

Stable, predictive biomarkers and interpretable disease signatures are seen as a significant step towards personalized medicine. In this perspective, integration of multi-omic data coming from genomics, transcriptomics, glycomics, proteomics, metabolomics is a powerful strategy to reconstruct and analyse complex multi-dimensional interactions, enabling deeper mechanistic and medical insight. At the same time, there is a rising concern that much of such different omic data –although often publicly and freely available- lie in databases and repositories underutilised or not used at all. Issues coming from lack of standardisation and shared biological identities are also well-known. From these considerations, a novel, pressing request arises from the life sciences to design methodologies and approaches that allow for these data to be interpreted as a whole, i.e. as intertwined molecular signatures containing genes, proteins, mRNAs and miRNAs, able to capture inter-layers connections and complexity. This book collects papers discussing data integration approaches and methods of several types and extents, their application in understanding the pathogenesis of specific diseases or in identifying candidate biomarkers to exploit the full benefit of multi-omic datasets and their intrinsic information content.

Read more
immagine esempio

RETI - concetti essenziali e idee di base

AUTORI: PAOLO TIERI,

Traduzione italiana di NETWORK LITERACY - essential concepts and core ideas, un agile opuscolo destinato al pubblico che rappresenta il distillato dei pensieri, commenti e scritti di oltre 30 ricercatori di scienze delle reti, educatori, insegnanti e studenti.

Read more
immagine esempio

Security for Cloud Computing

AUTORI: FLAVIO LOMBARDI, ROBERTO DI PIETRO,

This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure computation over remote heterogeneous cloud nodes. This book shows that present cloud computing is inherently insecure therefore advanced execution models have to be developed to prevent unauthorized users from accessing or affecting others’ data and computation. The cloud approach enables on-demand scalable services that allow performing large computations without the costs and maintenance/management issues of costly server farms (thus enabling a novel kind of outsourced computing). Essential reading for software and computer engineers as well as data architects and IT professionals to better understand the complexity and heterogeneity of modern cloud- based scenarios.

Read more
Page 1 di 7 - next->