Sciweavers

2705 search results - page 498 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
127
Voted
CVPR
2008
IEEE
16 years 3 months ago
Constrained spectral clustering through affinity propagation
Pairwise constraints specify whether or not two samples should be in one cluster. Although it has been successful to incorporate them into traditional clustering methods, such as ...
Miguel Á. Carreira-Perpiñán, ...
FMCAD
2008
Springer
15 years 3 months ago
Automatic Non-Interference Lemmas for Parameterized Model Checking
Parameterized model checking refers to any method that extends traditional, finite-state model checking to handle systems arbitrary number of processes. One popular approach to thi...
Jesse D. Bingham
BIODATAMINING
2008
147views more  BIODATAMINING 2008»
15 years 1 months ago
Neural networks for genetic epidemiology: past, present, and future
During the past two decades, the field of human genetics has experienced an information explosion. The completion of the human genome project and the development of high throughpu...
Alison A. Motsinger-Reif, Marylyn D. Ritchie
BMCBI
2008
158views more  BMCBI 2008»
15 years 1 months ago
Analyzing M-CSF dependent monocyte/macrophage differentiation: Expression modes and meta-modes derived from an independent compo
Background: The analysis of high-throughput gene expression data sets derived from microarray experiments still is a field of extensive investigation. Although new approaches and ...
Dominik Lutter, Peter Ugocsai, Margot Grandl, Evel...
BMCBI
2008
228views more  BMCBI 2008»
15 years 1 months ago
Adaptive diffusion kernel learning from biological networks for protein function prediction
Background: Machine-learning tools have gained considerable attention during the last few years for analyzing biological networks for protein function prediction. Kernel methods a...
Liang Sun, Shuiwang Ji, Jieping Ye