Sciweavers

3604 search results - page 709 / 721
» All Common Subsequences
Sort
View
BICOB
2009
Springer
13 years 6 months ago
A Biclustering Method to Discover Co-regulated Genes Using Diverse Gene Expression Datasets
We propose a two-step biclustering approach to mine co-regulation patterns of a given reference gene to discover other genes that function in a common biological process. Currently...
Doruk Bozdag, Jeffrey D. Parvin, Ümit V. &Cce...
ICCAD
2009
IEEE
147views Hardware» more  ICCAD 2009»
13 years 6 months ago
SAT-based protein design
Computational protein design can be formulated as an optimization problem, where the objective is to identify the sequence of amino acids that minimizes the energy of a given prot...
Noah Ollikainen, Ellen Sentovich, Carlos Coelho, A...
ICTAC
2009
Springer
13 years 6 months ago
Integration Testing from Structured First-Order Specifications via Deduction Modulo
Testing from first-order specifications has mainly been studied for flat specifications, that are specifications of a single software module. However, the specifications of large s...
Delphine Longuet, Marc Aiguier
IDA
2009
Springer
13 years 6 months ago
Hierarchical Extraction of Independent Subspaces of Unknown Dimensions
Abstract. Independent Subspace Analysis (ISA) is an extension of Independent Component Analysis (ICA) that aims to linearly transform a random vector such as to render groups of it...
Peter Gruber, Harold W. Gutch, Fabian J. Theis
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 5 months ago
Novel Mechanism to Defend DDoS Attacks Caused by Spam
Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protect...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...