Protected pages
(first | last) View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Find common effectors for multiple gene sets (GeneWays) (workflow) (1,663 bytes) (fully protected) (Protection log)
- Find gene fusions from RNA-seq (workflow) (1,965 bytes) (fully protected) (Protection log)
- Find genome variants and indels from RNA-seq (workflow) (2,357 bytes) (fully protected) (Protection log)
- Find genome variants and indels from full-genome NGS (workflow) (1,613 bytes) (fully protected) (Protection log)
- Mapping to GO ontologies and comparison for two gene sets (workflow) (2,042 bytes) (fully protected) (Protection log)
- Mapping to ontology - select a classification (Gene table) (workflow) (1,803 bytes) (fully protected) (Protection log)
- Mapping to ontology - select a classification (2 Gene tables) (workflow) (1,810 bytes) (fully protected) (Protection log)
- Mapping to ontology - select a classification (Multiple Gene tables) (workflow) (2,114 bytes) (fully protected) (Protection log)
- Prediction of miRNA binding sites (workflow) (1,435 bytes) (fully protected) (Protection log)
- Quantification of RNA-seq with Cufflinks (no de-novo assembly) for FASTQ files (workflow) (2,085 bytes) (fully protected) (Protection log)
- Quantification of RNA-seq with Cufflinks (with de-novo assembly) for FASTQ files (workflow) (2,322 bytes) (fully protected) (Protection log)
- SRA to FASTQ (workflow) (1,181 bytes) (fully protected) (Protection log)
- Find enriched TF binding sites in variation sites (TRANSFAC(R)) (workflow) (439 bytes) (fully protected) (Protection log)
- Identify enriched motifs in tracks (TRANSFAC(R)) (workflow) (709 bytes) (fully protected) (Protection log)
- Enriched upstream analysis (TRANSFAC(R) and TRANSPATH(R)) (workflow) (552 bytes) (fully protected) (Protection log)
- Mapping to ontologies and comparison for two gene sets (TRANSPATH(R)) (workflow) (407 bytes) (fully protected) (Protection log)
- Find common effectors for multiple gene sets (TRANSPATH(R)) (workflow) (481 bytes) (fully protected) (Protection log)
- Substances - KEGG (620 bytes) (fully protected) (Protection log)
- Substances - DrugBank (825 bytes) (fully protected) (Protection log)
- Substances - CAS (693 bytes) (fully protected) (Protection log)
- Substances (reference type) (288 bytes) (fully protected) (Protection log)
- Proteins - Transpath isogroups (480 bytes) (fully protected) (Protection log)
- Create custom project (analysis) (787 bytes) (fully protected) (Protection log)
- BAM filter multi-hits (analysis) (601 bytes) (fully protected) (Protection log)
- Import ensembl homology (analysis) (614 bytes) (fully protected) (Protection log)
- Import HOCOMOCO (analysis) (1,026 bytes) (fully protected) (Protection log)
- Add genes from CMA (analysis) (1,272 bytes) (fully protected) (Protection log)
- Compare TFBS mutations (analysis) (1,471 bytes) (fully protected) (Protection log)
- Construct composite modules on tracks with keynodes (analysis) (4,196 bytes) (fully protected) (Protection log)
- Construct composite modules with keynodes (analysis) (4,052 bytes) (fully protected) (Protection log)
- Convert site search summary (analysis) (1,753 bytes) (fully protected) (Protection log)
- Get transcripts track (analysis) (804 bytes) (fully protected) (Protection log)
- Recalculate composite module score on new track (analysis) (1,131 bytes) (fully protected) (Protection log)
- Site search report (analysis) (901 bytes) (fully protected) (Protection log)
- LS-regression analysis (888 bytes) (fully protected) (Protection log)
- Oligonucleotides in sequence samples (analysis) (952 bytes) (fully protected) (Protection log)
- Matrix derivation (analysis) (2,518 bytes) (fully protected) (Protection log)
- Colon cancer signature2 (analysis) (686 bytes) (fully protected) (Protection log)
- Univariate samples analysis (1,160 bytes) (fully protected) (Protection log)
- Colon cancer signature (analysis) (1,208 bytes) (fully protected) (Protection log)
- Univariate sample analysis (1,138 bytes) (fully protected) (Protection log)
- Apply events (analysis) (2,582 bytes) (fully protected) (Protection log)
- Transform track to table (analysis) (1,397 bytes) (fully protected) (Protection log)
- Generate dynamic model (analysis) (816 bytes) (fully protected) (Protection log)
- Parameter identifiability (optimization) (analysis) (1,345 bytes) (fully protected) (Protection log)
- Parameter fitting (analysis) (2,734 bytes) (fully protected) (Protection log)
- Key Node Sensitivity Analysis (2,974 bytes) (fully protected) (Protection log)
- Parameter identifiability (table) (analysis) (2,069 bytes) (fully protected) (Protection log)
- Score based FBC table builder (analysis) (4,400 bytes) (fully protected) (Protection log)
- Run a Workflow as Analysis (738 bytes) (fully protected) (Protection log)