Sciweavers

1296 search results - page 57 / 260
» Multiplicative Background Risk
Sort
View
105
Voted
BMCBI
2006
156views more  BMCBI 2006»
15 years 18 days ago
Bayesian models for pooling microarray studies with multiple sources of replications
Background: Biologists often conduct multiple but different cDNA microarray studies that all target the same biological system or pathway. Within each study, replicate slides with...
Erin M. Conlon, Joon J. Song, Jun S. Liu
103
Voted
BMCBI
2008
138views more  BMCBI 2008»
15 years 20 days ago
Systematic identification of yeast cell cycle transcription factors using multiple data sources
Background: Eukaryotic cell cycle is a complex process and is precisely regulated at many levels. Many genes specific to the cell cycle are regulated transcriptionally and are exp...
Wei-Sheng Wu, Wen-Hsiung Li
PAA
2002
15 years 6 days ago
Combining Discriminant Models with New Multi-Class SVMs
: The idea of performing model combination, instead of model selection, has a long theoretical background in statistics. However, making use of theoretical results is ordinarily su...
Yann Guermeur
117
Voted
BMCBI
2005
143views more  BMCBI 2005»
15 years 13 days ago
Gene capture prediction and overlap estimation in EST sequencing from one or multiple libraries
Background: In expressed sequence tag (EST) sequencing, we are often interested in how many genes we can capture in an EST sample of a targeted size. This information provides ins...
Ji-Ping Z. Wang, Bruce G. Lindsay 0002, Liying Cui...
86
Voted
FC
2007
Springer
152views Cryptology» more  FC 2007»
15 years 6 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig