Sciweavers

554 search results - page 92 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
14 years 3 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
14 years 2 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
BMCBI
2007
265views more  BMCBI 2007»
13 years 8 months ago
Large scale clustering of protein sequences with FORCE -A layout based heuristic for weighted cluster editing
Background: Detecting groups of functionally related proteins from their amino acid sequence alone has been a long-standing challenge in computational genome research. Several clu...
Tobias Wittkop, Jan Baumbach, Francisco P. Lobo, S...
BMCBI
2008
129views more  BMCBI 2008»
13 years 8 months ago
Motif-directed network component analysis for regulatory network inference
Background: Network Component Analysis (NCA) has shown its effectiveness in discovering regulators and inferring transcription factor activities (TFAs) when both microarray data a...
Chen Wang, Jianhua Xuan, Li Chen, Po Zhao, Yue Wan...
BMCBI
2006
108views more  BMCBI 2006»
13 years 8 months ago
Gene function classification using Bayesian models with hierarchy-based priors
We investigate the application of hierarchical classification schemes to the annotation of gene function based on several characteristics of protein sequences including phylogenic ...
Babak Shahbaba, Radford M. Neal