Sciweavers

2774 search results - page 536 / 555
» Exploiting Deep Structure
Sort
View
ADHOC
2007
144views more  ADHOC 2007»
15 years 2 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
ALMOB
2008
95views more  ALMOB 2008»
15 years 2 months ago
A stitch in time: Efficient computation of genomic DNA melting bubbles
Background: It is of biological interest to make genome-wide predictions of the locations of DNA melting bubbles using statistical mechanics models. Computationally, this poses th...
Eivind Tøstesen
141
Voted
BMCBI
2010
183views more  BMCBI 2010»
15 years 2 months ago
SING: Subgraph search In Non-homogeneous Graphs
Background: Finding the subgraphs of a graph database that are isomorphic to a given query graph has practical applications in several fields, from cheminformatics to image unders...
Raffaele Di Natale, Alfredo Ferro, Rosalba Giugno,...
BMCBI
2010
179views more  BMCBI 2010»
15 years 2 months ago
A semi-supervised learning approach to predict synthetic genetic interactions by combining functional and topological properties
Background: Genetic interaction profiles are highly informative and helpful for understanding the functional linkages between genes, and therefore have been extensively exploited ...
Zhuhong You, Zheng Yin, Kyungsook Han, De-Shuang H...
132
Voted
BMCBI
2010
131views more  BMCBI 2010»
15 years 2 months ago
FACT: Functional annotation transfer between proteins with similar feature architectures
Background: The increasing number of sequenced genomes provides the basis for exploring the genetic and functional diversity within the tree of life. Only a tiny fraction of the e...
Tina Koestler, Arndt von Haeseler, Ingo Ebersberge...