Sciweavers

5722 search results - page 913 / 1145
» Security Function Interactions
Sort
View
BMCBI
2008
163views more  BMCBI 2008»
15 years 3 months ago
The Annotation, Mapping, Expression and Network (AMEN) suite of tools for molecular systems biology
Background: High-throughput genome biological experiments yield large and multifaceted datasets that require flexible and user-friendly analysis tools to facilitate their interpre...
Frédéric Chalmel, Michael Primig
BMCBI
2008
144views more  BMCBI 2008»
15 years 3 months ago
Pep-3D-Search: a method for B-cell epitope prediction based on mimotope analysis
Background: The prediction of conformational B-cell epitopes is one of the most important goals in immunoinformatics. The solution to this problem, even if approximate, would help...
Yanxin Huang, Yongli Bao, Shu Yan Guo, Yan Wang, C...
CG
2008
Springer
15 years 3 months ago
Masked photo blending: Mapping dense photographic data set on high-resolution sampled 3D models
The technological advance of sensors is producing an exponential size growth of the data coming from 3D scanning and digital photography. The production of digital 3D models consi...
Marco Callieri, Paolo Cignoni, Massimiliano Corsin...
CORR
2010
Springer
177views Education» more  CORR 2010»
15 years 3 months ago
Supervised Random Walks: Predicting and Recommending Links in Social Networks
Predicting the occurrence of links is a fundamental problem in networks. In the link prediction problem we are given a snapshot of a network and would like to infer which interact...
Lars Backstrom, Jure Leskovec
AI
2006
Springer
15 years 3 months ago
Constraint-based optimization and utility elicitation using the minimax decision criterion
In many situations, a set of hard constraints encodes the feasible configurations of some system or product over which multiple users have distinct preferences. However, making su...
Craig Boutilier, Relu Patrascu, Pascal Poupart, Da...