Sciweavers

5722 search results - page 42 / 1145
» Security Function Interactions
Sort
View
COR
2002
90views more  COR 2002»
15 years 4 months ago
Extremist vs. centrist decision behavior: quasi-convex utility functions for interactive multi-objective linear programming prob
This paper presents the fundamental theory and algorithms for identifying the most preferred alternative for a decision maker (DM) having a non-centrist (or extremist) preferentia...
Behnam Malakooti, Jumah E. Al-alwani
BMCBI
2010
136views more  BMCBI 2010»
15 years 5 months ago
A hub-attachment based method to detect functional modules from confidence-scored protein interactions and expression profiles
Background: Many research results show that the biological systems are composed of functional modules. Members in the same module usually have common functions. This is useful inf...
Chia-Hao Chin, Shu-Hwa Chen, Chin-Wen Ho, Ming-Tat...
149
Voted
CSB
2005
IEEE
180views Bioinformatics» more  CSB 2005»
15 years 10 months ago
Functional Modularity in a Large-Scale Mammalian Molecular Interaction Network
The Ingenuity™ Pathways Knowledge Base (IPKB) contains over one million findings manually curated from the scientific literature. Highly-structured content from the IPKB forms...
Andreas Kramer, Daniel R. Richards, James O. Bowlb...
JMLR
2010
136views more  JMLR 2010»
14 years 11 months ago
Predicting the functions of proteins in Protein-Protein Interaction networks from global information
In this work we present a novel approach to predict the function of proteins in protein-protein interaction (PPI) networks. We classify existing approaches into inductive and tran...
Hossein Rahmani, Hendrik Blockeel, Andreas Bender
ISCI
2006
77views more  ISCI 2006»
15 years 5 months ago
Interaction transform for bi-set functions over a finite set
Set functions appear as a useful tool in many areas of decision making and operations research, and several linear invertible transformations have been introduced for set function...
Fabien Lange, Michel Grabisch