Sciweavers

118 search results - page 22 / 24
» Two k-winners-take-all networks with discontinuous activatio...
Sort
View
87
Voted
BMCBI
2007
182views more  BMCBI 2007»
14 years 11 months ago
Identifying regulatory targets of cell cycle transcription factors using gene expression and ChIP-chip data
Background: ChIP-chip data, which indicate binding of transcription factors (TFs) to DNA regions in vivo, are widely used to reconstruct transcriptional regulatory networks. Howev...
Wei-Sheng Wu, Wen-Hsiung Li, Bor-Sen Chen
BMCBI
2008
114views more  BMCBI 2008»
14 years 11 months ago
WSPMaker: a web tool for calculating selection pressure in proteins and domains using window-sliding
Background: In the study of adaptive evolution, it is important to detect the protein coding sites where natural selection is acting. In general, the ratio of the rate of non-syno...
Yong Seok Lee, Tae-Hyung Kim, Tae-Wook Kang, Won-H...
118
Voted
ISORC
2002
IEEE
15 years 4 months ago
End-to-End Latency of a Fault-Tolerant CORBA Infrastructure
This paper presents measured probability density functions (pdfs) for the end-to-end latency of two-way remote method invocations from a CORBA client to a replicated CORBA server ...
Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith
IJCAI
1997
15 years 29 days ago
Combining Probabilistic Population Codes
We study the problemof statisticallycorrect inference in networks whose basic representations are population codes. Population codes are ubiquitous in the brain, and involve the s...
Richard S. Zemel, Peter Dayan
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 11 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya