Sciweavers

1017 search results - page 123 / 204
» A General Model for Authenticated Data Structures
Sort
View
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 9 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
BMCBI
2007
156views more  BMCBI 2007»
13 years 9 months ago
Accuracy of structure-based sequence alignment of automatic methods
Background: Accurate sequence alignments are essential for homology searches and for building three-dimensional structural models of proteins. Since structure is better conserved ...
Changhoon Kim, Byungkook Lee
BMCBI
2005
89views more  BMCBI 2005»
13 years 8 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg
SEMCO
2007
IEEE
14 years 3 months ago
Unrestricted Coreference: Identifying Entities and Events in OntoNotes
Most research in the field of anaphora or coreference detection has been limited to noun phrase coreference, usually on a restricted set of entities, such as ACE entities. In par...
Sameer S. Pradhan, Lance A. Ramshaw, Ralph M. Weis...
CP
2005
Springer
14 years 2 months ago
Applying Constraint Programming to Rigid Body Protein Docking
In this paper we show how Constraint Programming (CP) techniques can improve the efficiency and applicability of grid-based algorithms for optimising surface contact between comple...
Ludwig Krippahl, Pedro Barahona