Sciweavers

758 search results - page 149 / 152
» Coding Exon Detection Using Comparative Sequences
Sort
View
TIT
2008
90views more  TIT 2008»
13 years 10 months ago
Scanning and Sequential Decision Making for Multidimensional Data - Part II: The Noisy Case
We consider the problem of sequential decision making for random fields corrupted by noise. In this scenario, the decision maker observes a noisy version of the data, yet judged wi...
Asaf Cohen, Tsachy Weissman, Neri Merhav
CANDC
2004
ACM
13 years 10 months ago
The difficult interpretation of transcriptome data: the case of the GATC regulatory network
Genomic analyses on part of Escherichia coli's chromosome had suggested the existence of a GATC regulated network. This has recently been confirmed through a transcriptome an...
Alessandra Riva, Marie-Odile Delorme, Tony Chevali...
ACSAC
2008
IEEE
14 years 5 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
NAR
2006
142views more  NAR 2006»
13 years 10 months ago
miRNAMap: genomic maps of microRNA genes and their target genes in mammalian genomes
Recent work has demonstrated that microRNAs (miRNAs) are involved in critical biological processes by suppressing the translation of coding genes. This work develops an integrated...
Paul Wei-Che Hsu, Hsien-Da Huang, Sheng-Da Hsu, Li...
INFOCOM
2005
IEEE
14 years 4 months ago
TCP vs. TCP: a systematic study of adverse impact of short-lived TCP flows on long-lived TCP flows
— While earlier studies have pointed out that short-lived TCP flows (mice) may hurt long-lived TCP flows (elephants) in the long term, they provide insufficient insight for devel...
S. Ebrahimi-Taghizadeh, Ahmed Helmy, Sandeep K. S....