Sciweavers

79 search results - page 16 / 16
» Combining email models for false positive reduction
Sort
View
76
Voted
BMCBI
2008
80views more  BMCBI 2008»
14 years 11 months ago
Computational evaluation of TIS annotation for prokaryotic genomes
Background: Accurate annotation of translation initiation sites (TISs) is essential for understanding the translation initiation mechanism. However, the reliability of TIS annotat...
Gang-Qing Hu, Xiaobin Zheng, Li-Ning Ju, Huaiqiu Z...
102
Voted
BMCBI
2006
119views more  BMCBI 2006»
14 years 11 months ago
Evaluation of microarray data normalization procedures using spike-in experiments
Background: Recently, a large number of methods for the analysis of microarray data have been proposed but there are few comparisons of their relative performances. By using so-ca...
Patrik Rydén, Henrik Andersson, Mattias Lan...
IACR
2011
87views more  IACR 2011»
13 years 11 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
86
Voted
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
16 years 6 days ago
Characteristic relational patterns
Research in relational data mining has two major directions: finding global models of a relational database and the discovery of local relational patterns within a database. While...
Arne Koopman, Arno Siebes