Sciweavers

1316 search results - page 252 / 264
» Comparing mathematical models on the problem of network infe...
Sort
View
131
Voted
BMCBI
2007
158views more  BMCBI 2007»
15 years 2 months ago
Penalized likelihood for sparse contingency tables with an application to full-length cDNA libraries
Background: The joint analysis of several categorical variables is a common task in many areas of biology, and is becoming central to systems biology investigations whose goal is ...
Corinne Dahinden, Giovanni Parmigiani, Mark C. Eme...
117
Voted
ATAL
2007
Springer
15 years 8 months ago
Distributed management of flexible times schedules
In this paper we consider the problem of managing and exploiting schedules in an uncertain and distributed environment. We assume a team of collaborative agents, each responsible ...
Stephen F. Smith, Anthony Gallagher, Terry L. Zimm...
89
Voted
DAC
2006
ACM
16 years 2 months ago
Circuit simulation based obstacle-aware Steiner routing
Steiner routing is a fundamental yet NP-hard problem in VLSI design and other research fields. In this paper, we propose to model the routing graph by an RC network with routing t...
Yiyu Shi, Paul Mesa, Hao Yu, Lei He
IDTRUST
2009
ACM
15 years 8 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
101
Voted
ICASSP
2009
IEEE
15 years 8 months ago
Conditional random fields for the prediction of signal peptide cleavage sites
Correct prediction of signal peptide cleavage sites has a significant impact on drug design. State-of-the-art approaches to cleavage site prediction typically use generative mode...
Man-Wai Mak, Sun-Yuan Kung