Sciweavers

1204 search results - page 224 / 241
» Termination of Polynomial Programs
Sort
View
IICAI
2003
13 years 10 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
BMCBI
2007
115views more  BMCBI 2007»
13 years 8 months ago
Comparing sequences without using alignments: application to HIV/SIV subtyping
Background: In general, the construction of trees is based on sequence alignments. This procedure, however, leads to loss of informationwhen parts of sequence alignments (for inst...
Gilles Didier, Laurent Debomy, Maude Pupin, Ming Z...
BMCBI
2007
106views more  BMCBI 2007»
13 years 8 months ago
Mining prokaryotic genomes for unknown amino acids: a stop-codon-based approach
Background: Selenocysteine and pyrrolysine are the 21st and 22nd amino acids, which are genetically encoded by stop codons. Since a number of microbial genomes have been completel...
Masashi Fujita, Hisaaki Mihara, Susumu Goto, Nobuy...
BMCBI
2007
156views more  BMCBI 2007»
13 years 8 months ago
Bio: : NEXUS: a Perl API for the NEXUS format for comparative biological data
Background: Evolutionary analysis provides a formal framework for comparative analysis of genomic and other data. In evolutionary analysis, observed data are treated as the termin...
Thomas Hladish, Vivek Gopalan, Chengzhi Liang, Wei...
BMCBI
2006
82views more  BMCBI 2006»
13 years 8 months ago
Transcriptomic response to differentiation induction
Background: Microarrays used for gene expression studies yield large amounts of data. The processing of such data typically leads to lists of differentially-regulated genes. A com...
G. W. Patton, Robert M. Stephens, I. A. Sidorov, X...