Sciweavers

4340 search results - page 687 / 868
» Formal Methods and Cryptography
Sort
View
BMCBI
2008
138views more  BMCBI 2008»
15 years 5 months ago
M-BISON: Microarray-based integration of data sources using networks
Background: The accurate detection of differentially expressed (DE) genes has become a central task in microarray analysis. Unfortunately, the noise level and experimental variabi...
Bernie J. Daigle Jr., Russ B. Altman
145
Voted
BMCBI
2006
112views more  BMCBI 2006»
15 years 5 months ago
Algorithms for incorporating prior topological information in HMMs: application to transmembrane proteins
Background: Hidden Markov Models (HMMs) have been extensively used in computational molecular biology, for modelling protein and nucleic acid sequences. In many applications, such...
Pantelis G. Bagos, Theodore D. Liakopoulos, Stavro...
ENTCS
2007
168views more  ENTCS 2007»
15 years 5 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
153
Voted
SPEECH
2010
152views more  SPEECH 2010»
15 years 3 months ago
Single-channel speech enhancement using spectral subtraction in the short-time modulation domain
In this paper we investigate the modulation domain as an alternative to the acoustic domain for speech enhancement. More specifically, we wish to determine how competitive the mo...
Kuldip K. Paliwal, Kamil Wójcicki, Belinda ...
BMCBI
2011
15 years 3 days ago
DoBo: Protein domain boundary prediction by integrating evolutionary signals and machine learning
Background: Accurate identification of protein domain boundaries is useful for protein structure determination and prediction. However, predicting protein domain boundaries from a...
Jesse Eickholt, Xin Deng, Jianlin Cheng