Sciweavers

2006 search results - page 300 / 402
» Heuristic Security-Testing Methods
Sort
View
ECAI
2004
Springer
15 years 4 months ago
Lakatos-Style Automated Theorem Modification
We describe a flexible approach to automated reasoning, where non-theorems can be automatically altered to produce proved results which are related to the original. This is achieve...
Simon Colton, Alison Pease
BMCBI
2010
130views more  BMCBI 2010»
15 years 24 days ago
Knowledge-guided gene ranking by coordinative component analysis
Background: In cancer, gene networks and pathways often exhibit dynamic behavior, particularly during the process of carcinogenesis. Thus, it is important to prioritize those gene...
Chen Wang, Jianhua Xuan, Huai Li, Yue Wang, Ming Z...
119
Voted
BMCBI
2010
151views more  BMCBI 2010»
15 years 24 days ago
Misty Mountain clustering: application to fast unsupervised flow cytometry gating
Background: There are many important clustering questions in computational biology for which no satisfactory method exists. Automated clustering algorithms, when applied to large,...
István P. Sugár, Stuart C. Sealfon
121
Voted
EOR
2010
88views more  EOR 2010»
15 years 23 days ago
Mathematical programming approaches for generating p-efficient points
Abstract: Probabilistically constrained problems, in which the random variables are finitely distributed, are nonconvex in general and hard to solve. The p-efficiency concept has b...
Miguel A. Lejeune, Nilay Noyan
BMCBI
2006
88views more  BMCBI 2006»
15 years 22 days ago
A two-sample Bayesian t-test for microarray data
Background: Determining whether a gene is differentially expressed in two different samples remains an important statistical problem. Prior work in this area has featured the use ...
Richard J. Fox, Matthew W. Dimmic