Previous studies of alarm design have concluded that the faster a mental representation of the cause of the alarm is activated, the quicker the adapted reaction. In order to selec...
Given a graph G, an identifying code D V (G) is a vertex set such that for any two distinct vertices v1, v2 V (G), the sets N[v1] D and N[v2] D are distinct and nonempty (here...
In an undirected graph G = (V, E), a subset C V such that C is a dominating set of G, and each vertex in V is dominated by a distinct subset of vertices from C, is called an iden...
Florent Foucaud, Ralf Klasing, Adrian Kosowski, An...
User generated content that appears on weblogs, wikis and social networks has been increasing at an unprecedented rate. The wealth of information produced by individuals from diff...
: This study presents a novel network methodology to identify prognostic gene signatures. Implication networks based on prediction logic are used to construct genome-wide coexpress...
Nancy Lan Guo, Ying-Wooi Wan, Swetha Bose, James D...