Sciweavers

2018 search results - page 229 / 404
» Code Normal Forms
Sort
View
BMCBI
2006
75views more  BMCBI 2006»
15 years 2 months ago
A machine learning strategy to identify candidate binding sites in human protein-coding sequence
Background: The splicing of RNA transcripts is thought to be partly promoted and regulated by sequences embedded within exons. Known sequences include binding sites for SR protein...
Thomas Down, Bernard Leong, Tim J. P. Hubbard
114
Voted
CORR
2007
Springer
115views Education» more  CORR 2007»
15 years 2 months ago
Error Exponents of Erasure/List Decoding Revisited via Moments of Distance Enumerators
The analysis of random coding error exponents pertaining to erasure/list decoding, due to Forney, is revisited. Instead of using Jensen’s inequality as well as some other inequa...
Neri Merhav
SAC
2008
ACM
15 years 1 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
ICSE
2011
IEEE-ACM
14 years 5 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
96
Voted
WWW
2005
ACM
16 years 3 months ago
Finding group shilling in recommendation system
In the age of information explosion, recommendation system has been proved effective to cope with information overload in ecommerce area. However, unscrupulous producers shill the...
Xue-Feng Su, Hua-Jun Zeng, Zheng Chen