Sciweavers

325 search results - page 60 / 65
» Analysis of the constraint proposal method for two-party neg...
Sort
View
BMCBI
2010
95views more  BMCBI 2010»
13 years 7 months ago
Identifying main effects and epistatic interactions from large-scale SNP data via adaptive group Lasso
Background: Single nucleotide polymorphism (SNP) based association studies aim at identifying SNPs associated with phenotypes, for example, complex diseases. The associated SNPs m...
Can Yang, Xiang Wan, Qiang Yang, Hong Xue, Weichua...
MP
2006
138views more  MP 2006»
13 years 7 months ago
A new ILP-based refinement heuristic for Vehicle Routing Problems
In the paper we address the Distance-Constrained Capacitated Vehicle Routing Problem (DCVRP), where k minimum-cost routes through a central depot have to be constructed so as to co...
Roberto De Franceschi, Matteo Fischetti, Paolo Tot...
WABI
2010
Springer
167views Bioinformatics» more  WABI 2010»
13 years 5 months ago
Quantifying the Strength of Natural Selection of a Motif Sequence
Quantification of selective pressures on regulatory sequences is a central question in studying the evolution of gene regulatory networks. Previous methods focus primarily on sing...
Chen-Hsiang Yeang
COMPSAC
2010
IEEE
13 years 5 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 5 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang