Sciweavers

4270 search results - page 2 / 854
» A Permutation Approach to Validation
Sort
View
ISAMI
2010
13 years 3 months ago
A Data Mining Approach for the Detection of High-Risk Breast Cancer Groups
It is widely agreed that complex diseases are typically caused by the joint effects of multiple instead of a single genetic variation. These genetic variations may show very little...
Orlando Anunciação, Bruno C. Gomes, ...
ASAP
2003
IEEE
99views Hardware» more  ASAP 2003»
13 years 9 months ago
Using Group Theory to Specify Application Specific Interconnection Networks for SIMD DSPs
We introduce another view of group theory in the field of interconnection networks. With this approach it is possible to specify application specific network topologies for permut...
Thorsten Dräger, Gerhard Fettweis
IJBRA
2007
89views more  IJBRA 2007»
13 years 5 months ago
Conservative adjustment of permutation p-values when the number of permutations is limited
The permutation procedure is widely used to assess the significance level (p-value) of a test statistic. This approach is asymptotically consistent. In genomics and proteomics st...
Yinglei Lai
COMBINATORICS
2006
137views more  COMBINATORICS 2006»
13 years 5 months ago
Three-Letter-Pattern-Avoiding Permutations and Functional Equations
We present an algorithm for finding a system of recurrence relations for the number of permutations of length n that satisfy a certain set of conditions. A rewriting of these rela...
Ghassan Firro, Toufik Mansour
IJES
2008
102views more  IJES 2008»
13 years 5 months ago
Alternative application-specific processor architectures for fast arbitrary bit permutations
Block ciphers are used to encrypt data and provide data confidentiality. For interoperability reasons, it is desirable to support a variety of block ciphers efficiently. Of the bas...
Zhijie Jerry Shi, Xiao Yang, Ruby B. Lee