Sciweavers

5722 search results - page 42 / 1145
» Security Function Interactions
Sort
View
COR
2002
90views more  COR 2002»
13 years 8 months ago
Extremist vs. centrist decision behavior: quasi-convex utility functions for interactive multi-objective linear programming prob
This paper presents the fundamental theory and algorithms for identifying the most preferred alternative for a decision maker (DM) having a non-centrist (or extremist) preferentia...
Behnam Malakooti, Jumah E. Al-alwani
BMCBI
2010
136views more  BMCBI 2010»
13 years 8 months ago
A hub-attachment based method to detect functional modules from confidence-scored protein interactions and expression profiles
Background: Many research results show that the biological systems are composed of functional modules. Members in the same module usually have common functions. This is useful inf...
Chia-Hao Chin, Shu-Hwa Chen, Chin-Wen Ho, Ming-Tat...
CSB
2005
IEEE
180views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Functional Modularity in a Large-Scale Mammalian Molecular Interaction Network
The Ingenuity™ Pathways Knowledge Base (IPKB) contains over one million findings manually curated from the scientific literature. Highly-structured content from the IPKB forms...
Andreas Kramer, Daniel R. Richards, James O. Bowlb...
JMLR
2010
136views more  JMLR 2010»
13 years 3 months ago
Predicting the functions of proteins in Protein-Protein Interaction networks from global information
In this work we present a novel approach to predict the function of proteins in protein-protein interaction (PPI) networks. We classify existing approaches into inductive and tran...
Hossein Rahmani, Hendrik Blockeel, Andreas Bender
ISCI
2006
77views more  ISCI 2006»
13 years 8 months ago
Interaction transform for bi-set functions over a finite set
Set functions appear as a useful tool in many areas of decision making and operations research, and several linear invertible transformations have been introduced for set function...
Fabien Lange, Michel Grabisch