Sciweavers

672 search results - page 128 / 135
» Words and forbidden factors
Sort
View
BMCBI
2008
171views more  BMCBI 2008»
13 years 8 months ago
Comparative analysis of five protein-protein interaction corpora
Background: Growing interest in the application of natural language processing methods to biomedical text has led to an increasing number of corpora and methods targeting protein-...
Sampo Pyysalo, Antti Airola, Juho Heimonen, Jari B...
CN
2008
117views more  CN 2008»
13 years 8 months ago
Broker-placement in latency-aware peer-to-peer networks
In large peer-to-peer (P2P) overlay networks, nodes usually share resources to support all kinds of applications. In such networks, a subset of the nodes may assume the role of br...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 8 months ago
MINRES-QLP: a Krylov subspace method for indefinite or singular symmetric systems
Abstract. CG, SYMMLQ, and MINRES are Krylov subspace methods for solving large symmetric systems of linear equations. CG (the conjugate-gradient method) is reliable on positive-def...
Sou-Cheng T. Choi, Christopher C. Paige, Michael A...
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 8 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
CSSC
2008
110views more  CSSC 2008»
13 years 8 months ago
Bayesian False Discovery Rate Wavelet Shrinkage: Theory and Applications
The interest in inference in the wavelet domain remains vibrant area of statistical research because of needs of scientific community to process and explore massive data sets. Prim...
Ilya Lavrik, Yoon Young Jung, Fabrizio Ruggeri, Br...