Sciweavers

2006 search results - page 361 / 402
» Heuristic Security-Testing Methods
Sort
View
BMCBI
2008
143views more  BMCBI 2008»
13 years 9 months ago
Automatic detection of exonic splicing enhancers (ESEs) using SVMs
Background: Exonic splicing enhancers (ESEs) activate nearby splice sites and promote the inclusion (vs. exclusion) of exons in which they reside, while being a binding site for S...
Britta Mersch, Alexander Gepperth, Sándor S...
BMCBI
2006
239views more  BMCBI 2006»
13 years 9 months ago
Applying dynamic Bayesian networks to perturbed gene expression data
Background: A central goal of molecular biology is to understand the regulatory mechanisms of gene transcription and protein synthesis. Because of their solid basis in statistics,...
Norbert Dojer, Anna Gambin, Andrzej Mizera, Bartek...
BMCBI
2006
139views more  BMCBI 2006»
13 years 9 months ago
Improvement in accuracy of multiple sequence alignment using novel group-to-group sequence alignment algorithm with piecewise li
Background: Multiple sequence alignment (MSA) is a useful tool in bioinformatics. Although many MSA algorithms have been developed, there is still room for improvement in accuracy...
Shinsuke Yamada, Osamu Gotoh, Hayato Yamana
IR
2006
13 years 9 months ago
Hierarchical clustering of a Finnish newspaper article collection with graded relevance assessments
Search facilitated with agglomerative hierarchical clustering methods was studied in a collection of Finnish newspaper articles (N = 53,893). To allow quick experiments, clustering...
Tuomo Korenius, Jorma Laurikkala, Martti Juhola, K...
SIGIR
2008
ACM
13 years 9 months ago
Learning from labeled features using generalized expectation criteria
It is difficult to apply machine learning to new domains because often we lack labeled problem instances. In this paper, we provide a solution to this problem that leverages domai...
Gregory Druck, Gideon S. Mann, Andrew McCallum