Sciweavers

2006 search results - page 300 / 402
» Heuristic Security-Testing Methods
Sort
View
ECAI
2004
Springer
14 years 1 months ago
Lakatos-Style Automated Theorem Modification
We describe a flexible approach to automated reasoning, where non-theorems can be automatically altered to produce proved results which are related to the original. This is achieve...
Simon Colton, Alison Pease
BMCBI
2010
130views more  BMCBI 2010»
13 years 9 months ago
Knowledge-guided gene ranking by coordinative component analysis
Background: In cancer, gene networks and pathways often exhibit dynamic behavior, particularly during the process of carcinogenesis. Thus, it is important to prioritize those gene...
Chen Wang, Jianhua Xuan, Huai Li, Yue Wang, Ming Z...
BMCBI
2010
151views more  BMCBI 2010»
13 years 9 months ago
Misty Mountain clustering: application to fast unsupervised flow cytometry gating
Background: There are many important clustering questions in computational biology for which no satisfactory method exists. Automated clustering algorithms, when applied to large,...
István P. Sugár, Stuart C. Sealfon
EOR
2010
88views more  EOR 2010»
13 years 9 months ago
Mathematical programming approaches for generating p-efficient points
Abstract: Probabilistically constrained problems, in which the random variables are finitely distributed, are nonconvex in general and hard to solve. The p-efficiency concept has b...
Miguel A. Lejeune, Nilay Noyan
BMCBI
2006
88views more  BMCBI 2006»
13 years 9 months ago
A two-sample Bayesian t-test for microarray data
Background: Determining whether a gene is differentially expressed in two different samples remains an important statistical problem. Prior work in this area has featured the use ...
Richard J. Fox, Matthew W. Dimmic