Sciweavers

1548 search results - page 257 / 310
» Estimating Software Vulnerabilities
Sort
View
BMCBI
2010
142views more  BMCBI 2010»
15 years 3 months ago
pplacer: linear time maximum-likelihood and Bayesian phylogenetic placement of sequences onto a fixed reference tree
Background: Likelihood-based phylogenetic inference is generally considered to be the most reliable classification method for unknown sequences. However, traditional likelihood-ba...
Frederick A. Matsen III, Robin B. Kodner, E. Virgi...
BMCBI
2007
135views more  BMCBI 2007»
15 years 3 months ago
Sequence similarity is more relevant than species specificity in probabilistic backtranslation
Background: Backtranslation is the process of decoding a sequence of amino acids into the corresponding codons. All synthetic gene design systems include a backtranslation module....
Alfredo Ferro, Rosalba Giugno, Giuseppe Pigola, Al...
BIOINFORMATICS
2005
93views more  BIOINFORMATICS 2005»
15 years 3 months ago
Donuts, scratches and blanks: robust model-based segmentation of microarray images
Inner holes, artifacts and blank spots are common in microarray images, but current image analysis methods do not pay them enough attention. We propose a new robust model-based me...
Qunhua Li, Chris Fraley, Roger Eugene Bumgarner, K...
124
Voted
WWW
2008
ACM
16 years 3 months ago
Characterizing typical and atypical user sessions in clickstreams
Millions of users retrieve information from the Internet using search engines. Mining these user sessions can provide valuable information about the quality of user experience and...
Narayanan Sadagopan, Jie Li
SIGIR
2005
ACM
15 years 8 months ago
Improving collection selection with overlap awareness in P2P search engines
Collection selection has been a research issue for years. Typically, in related work, precomputed statistics are employed in order to estimate the expected result quality of each ...
Matthias Bender, Sebastian Michel, Peter Triantafi...