Sciweavers

785 search results - page 144 / 157
» Information-Theoretic Tools for Mining Database Structure fr...
Sort
View
FASE
2010
Springer
14 years 10 days ago
Efficient Runtime Assertion Checking of Assignable Clauses with Datagroups
Runtime assertion checking is useful for debugging programs and specifications. Existing tools check invariants as well as method preand postconditions, but mostly ignore assignabl...
Hermann Lehner, Peter Müller
BMCBI
2010
70views more  BMCBI 2010»
13 years 9 months ago
The Text-mining based PubChem Bioassay neighboring analysis
Background: In recent years, the number of High Throughput Screening (HTS) assays deposited in PubChem has grown quickly. As a result, the volume of both the structured informatio...
Lianyi Han, Tugba O. Suzek, Yanli Wang, Steve H. B...
JDCTA
2010
150views more  JDCTA 2010»
13 years 3 months ago
A Knowledge Recommend System Based on User Model
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...
Jiagen Sheng, Sifeng Liu
BMCBI
2010
158views more  BMCBI 2010»
13 years 9 months ago
A Bayesian network approach to feature selection in mass spectrometry data
Background: Time-of-flight mass spectrometry (TOF-MS) has the potential to provide non-invasive, high-throughput screening for cancers and other serious diseases via detection of ...
Karl W. Kuschner, Dariya I. Malyarenko, William E....
IWCIA
2009
Springer
14 years 3 months ago
Signatures of Combinatorial Maps
Abstract. In this paper, we address the problem of computing a canonical representation of an n-dimensional combinatorial map. To do so, we define two combinatorial map signatures...
Stéphane Gosselin, Guillaume Damiand, Chris...