Sciweavers

1240 search results - page 101 / 248
» Applying Memetic Algorithms to the Analysis of Microarray Da...
Sort
View
COCOA
2008
Springer
15 years 5 months ago
Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries
A popular model for protecting privacy when person-specific data is released is k-anonymity. A dataset is k-anonymous if each record is identical to at least (k - 1) other records ...
Rhonda Chaytor, Patricia A. Evans, Todd Wareham
KDD
2004
ACM
138views Data Mining» more  KDD 2004»
16 years 3 months ago
IDR/QR: an incremental dimension reduction algorithm via QR decomposition
Dimension reduction is a critical data preprocessing step for many database and data mining applications, such as efficient storage and retrieval of high-dimensional data. In the ...
Jieping Ye, Qi Li, Hui Xiong, Haesun Park, Ravi Ja...
BMCBI
2011
14 years 10 months ago
Shape-based peak identification for ChIP-Seq
Background: The identification of binding targets for proteins using ChIP-Seq has gained popularity as an alternative to ChIP-chip. Sequencing can, in principle, eliminate artifac...
Valerie Hower, Steven N. Evans, Lior Pachter
126
Voted
BMCBI
2007
179views more  BMCBI 2007»
15 years 3 months ago
Gene selection with multiple ordering criteria
Background: A microarray study may select different differentially expressed gene sets because of different selection criteria. For example, the fold-change and p-value are two co...
James J. Chen, Chen-An Tsai, ShengLi Tzeng, Chun-H...
BMCBI
2007
125views more  BMCBI 2007»
15 years 3 months ago
Identification of discriminative characteristics for clusters from biologic data with InforBIO software
Background: There are a number of different methods for generation of trees and algorithms for phylogenetic analysis in the study of bacterial taxonomy. Genotypic information, suc...
Naoto Tanaka, Masataka Uchino, Satoru Miyazaki, Hi...