Sciweavers

1050 search results - page 154 / 210
» Two methods of authenticated positioning
Sort
View
BMCBI
2007
96views more  BMCBI 2007»
15 years 1 months ago
Features generated for computational splice-site prediction correspond to functional elements
Background: Accurate selection of splice sites during the splicing of precursors to messenger RNA requires both relatively well-characterized signals at the splice sites and auxil...
Rezarta Islamaj Dogan, Lise Getoor, W. John Wilbur...
101
Voted
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 1 months ago
An approach to RAID-6 based on cyclic groups of a prime order
As the size of data storing arrays of disks grows, it becomes vital to protect data against double disk failures. An economic way of providing such protection consists of adding tw...
R. Jackson, D. Rumynin, O. Zaboronski
BMCBI
2010
143views more  BMCBI 2010»
14 years 11 months ago
A genome alignment algorithm based on compression
Background: Traditional genome alignment methods consider sequence alignment as a variation of the string edit distance problem, and perform alignment by matching characters of th...
Minh Duc Cao, Trevor I. Dix, Lloyd Allison
RECOMB
2005
Springer
16 years 2 months ago
Very Low Power to Detect Asymmetric Divergence of Duplicated Genes
Abstract. Asymmetric functional divergence of paralogues is a key aspect of the traditional model of evolution following duplication. If one gene continues to perform the ancestral...
Cathal Seoighe, Konrad Scheffler
ICMLA
2008
15 years 3 months ago
Comparison with Parametric Optimization in Credit Card Fraud Detection
We apply five classification methods, Neural Nets(NN), Bayesian Nets(BN), Naive Bayes(NB), Artificial Immune Systems(AIS) [4] and Decision Trees(DT), to credit card fraud detectio...
Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pere...