Sciweavers

2904 search results - page 563 / 581
» Valuing Design Repair
Sort
View
BMCBI
2007
154views more  BMCBI 2007»
15 years 4 months ago
Inferring biological networks with output kernel trees
Background: Elucidating biological networks between proteins appears nowadays as one of the most important challenges in systems biology. Computational approaches to this problem ...
Pierre Geurts, Nizar Touleimat, Marie Dutreix, Flo...
BMCBI
2007
107views more  BMCBI 2007»
15 years 4 months ago
A computational approach for detecting peptidases and their specific inhibitors at the genome level
Background: Peptidases are proteolytic enzymes responsible for fundamental cellular activities in all organisms. Apparently about 2–5% of the genes encode for peptidases, irresp...
Lisa Bartoli, Remo Calabrese, Piero Fariselli, Dam...
BMCBI
2007
178views more  BMCBI 2007»
15 years 4 months ago
SVM clustering
Background: Support Vector Machines (SVMs) provide a powerful method for classification (supervised learning). Use of SVMs for clustering (unsupervised learning) is now being cons...
Stephen Winters-Hilt, Sam Merat
JAIR
2008
104views more  JAIR 2008»
15 years 4 months ago
M-DPOP: Faithful Distributed Implementation of Efficient Social Choice Problems
In the efficient social choice problem, the goal is to assign values, subject to side constraints, to a set of variables to maximize the total utility across a population of agent...
Adrian Petcu, Boi Faltings, David C. Parkes
JCS
2008
119views more  JCS 2008»
15 years 4 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev