Sciweavers

9888 search results - page 1956 / 1978
» Active Algorithm Selection
Sort
View
BMCBI
2008
97views more  BMCBI 2008»
13 years 9 months ago
Interrogating domain-domain interactions with parsimony based approaches
Background: The identification and characterization of interacting domain pairs is an important step towards understanding protein interactions. In the last few years, several met...
Katia S. Guimarães, Teresa M. Przytycka
BMCBI
2008
171views more  BMCBI 2008»
13 years 9 months ago
A general approach to simultaneous model fitting and variable elimination in response models for biological data with many more
Background: With the advent of high throughput biotechnology data acquisition platforms such as micro arrays, SNP chips and mass spectrometers, data sets with many more variables ...
Harri T. Kiiveri
BMCBI
2008
123views more  BMCBI 2008»
13 years 9 months ago
Functional module detection by functional flow pattern mining in protein interaction networks
eraction networks. In this abstract, we extend this approach by mining functional flow patterns for the purpose of detecting small-sized modules for specific functions. Methods Our...
Young-Rae Cho, Lei Shi, Aidong Zhang
BMCBI
2008
208views more  BMCBI 2008»
13 years 9 months ago
GraphFind: enhancing graph searching by low support data mining techniques
Background: Biomedical and chemical databases are large and rapidly growing in size. Graphs naturally model such kinds of data. To fully exploit the wealth of information in these...
Alfredo Ferro, Rosalba Giugno, Misael Mongiov&igra...
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 9 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
« Prev « First page 1956 / 1978 Last » Next »