Sciweavers

1040 search results - page 199 / 208
» Revenue maximization through
Sort
View
BMCBI
2010
123views more  BMCBI 2010»
15 years 4 months ago
Decoding HMMs using the k best paths: algorithms and applications
Background: Traditional algorithms for hidden Markov model decoding seek to maximize either the probability of a state path or the number of positions of a sequence assigned to th...
Daniel G. Brown 0001, Daniil Golod
BMCBI
2008
110views more  BMCBI 2008»
15 years 4 months ago
Enhancing the prediction of protein pairings between interacting families using orthology information
Background: It has repeatedly been shown that interacting protein families tend to have similar phylogenetic trees. These similarities can be used to predicting the mapping betwee...
José M. G. Izarzugaza, David de Juan, Carle...
COMCOM
2008
145views more  COMCOM 2008»
15 years 4 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
BMCBI
2006
112views more  BMCBI 2006»
15 years 4 months ago
A phylogenomic gene cluster resource: the Phylogenetically Inferred Groups (PhIGs) database
Background: We present here the PhIGs database, a phylogenomic resource for sequenced genomes. Although many methods exist for clustering gene families, very few attempt to create...
Paramvir S. Dehal, Jeffrey L. Boore
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 4 months ago
Broadcast Cooperation Strategies for Two Colocated Users
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocati...
Avi Steiner, Amichai Sanderovich, Shlomo Shamai