Sciweavers

3020 search results - page 552 / 604
» Type Analysis of Prolog Using Type Graphs
Sort
View
BMCBI
2011
12 years 11 months ago
Linear and non-linear dependencies between copy number aberrations and mRNA expression reveal distinct molecular pathways in Bre
Background: Elucidating the exact relationship between gene copy number and expression would enable identification of regulatory mechanisms of abnormal gene expression and biologi...
Hiroko K. Solvang, Ole Christian Lingjærde, ...
BMCBI
2011
12 years 11 months ago
Predicting mutually exclusive spliced exons based on exon length, splice site and reading frame conservation, and exon sequence
Background: Alternative splicing of pre-mature RNA is an important process eukaryotes utilize to increase their repertoire of different protein products. Several types of differen...
Holger Pillmann, Klas Hatje, Florian Odronitz, Bjo...
WWW
2005
ACM
14 years 8 months ago
CubeSVD: a novel approach to personalized Web search
As the competition of Web search market increases, there is a high demand for personalized Web search to conduct retrieval incorporating Web users' information needs. This pa...
Jian-Tao Sun, Hua-Jun Zeng, Huan Liu, Yuchang Lu, ...
WWW
2010
ACM
14 years 2 months ago
The paths more taken: matching DOM trees to search logs for accurate webpage clustering
An unsupervised clustering of the webpages on a website is a primary requirement for most wrapper induction and automated data extraction methods. Since page content can vary dras...
Deepayan Chakrabarti, Rupesh R. Mehta
ASIACRYPT
2009
Springer
14 years 2 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...