Sciweavers

457 search results - page 23 / 92
» A relative trust-region algorithm for independent component ...
Sort
View
BMCBI
2006
183views more  BMCBI 2006»
14 years 9 months ago
Mining gene expression data by interpreting principal components
Background: There are many methods for analyzing microarray data that group together genes having similar patterns of expression over all conditions tested. However, in many insta...
Joseph C. Roden, Brandon W. King, Diane Trout, Ali...
POPL
2012
ACM
13 years 5 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
GECCO
2007
Springer
159views Optimization» more  GECCO 2007»
15 years 1 months ago
Discrimination of metabolic flux profiles using a hybrid evolutionary algorithm
Studying metabolic fluxes is a crucial aspect of understanding biological phenotypes. However, it is often not possible to measure these fluxes directly. As an alternative, fluxom...
Stefan Bleuler, Eckart Zitzler
82
Voted
IDA
2009
Springer
14 years 7 months ago
Source Separation of Phase-Locked Subspaces
We present a two-stage algorithm to perform blind source separation of sources organized in subspaces, where sources in different subspaces have zero phase synchrony and sources in...
Miguel Almeida, Ricardo Vigário
ICSM
2007
IEEE
15 years 4 months ago
Computation of Static Execute After Relation with Applications to Software Maintenance
In this paper, we introduce Static Execute After (SEA) relationship among program components and present an efficient analysis algorithm. Our case studies show that SEA may appro...
Árpád Beszédes, Tamás ...