Filters








73,884 Hits in 4.1 sec

EnRICH: Extraction and Ranking using Integration and Criteria Heuristics

Xia Zhang, M Heather West Greenlee, Jeanne M Serb
2013 BMC Systems Biology  
from heterogeneous data sources.  ...  With the flexibility to specify data sources and filtering criteria, EnRICH automatically prioritizes candidate genes or gene relationships for biologists based on their specific requirements.  ...  It allows the user to define data sources, and to integrate them as well as specify multiple sorting criteria specific to each data source.  ... 
doi:10.1186/1752-0509-7-4 pmid:23320748 pmcid:PMC3564850 fatcat:p2d53b2jefhbxb3t5nuz2idjzu

Heterogeneous Network Edge Prediction: A Data Integration Approach to Prioritize Disease-Associated Genes

Daniel S. Himmelstein, Sergio E. Baranzini, Hua Tang
2015 PLoS Computational Biology  
From this network composed of 40,343 nodes and 1,608,168 edges, we extracted features that describe the topology between specific genes and diseases.  ...  We built on a technique developed for social network analysis, which embraces disparate sources of data to make predictions from heterogeneous networks.  ...  After setting α and w, we jointly optimized the two edge-inclusion thresholds using the AUROC for the GeTlD feature, whose metapath is composed from the two edges requiring thresholds (S3 Fig) .  ... 
doi:10.1371/journal.pcbi.1004259 pmid:26158728 pmcid:PMC4497619 fatcat:qydzyms3cvep7a2v3ntwjkbx4q

Heterogeneous Network Edge Prediction: A Data Integration Approach to Prioritize Disease-Associated Genes [article]

Daniel S Himmelstein, Sergio E Baranzini
2014 bioRxiv   pre-print
From this network composed of 40,343 nodes and 1,608,168 edges, we extracted features that describe the topology between specific genes and diseases.  ...  Heterogeneous network edge prediction effectively prioritized genetic associations and provides a powerful new approach for data integration across multiple domains.  ...  The denominator for NPC equals the 399 number of paths from the source to any target plus the number of paths from any target to the source.  ... 
doi:10.1101/011569 fatcat:uwxh3nidtfh37afyj7s2ipn46m

Step Towards m-Health in Pediatrics

Rui Oliveira, Simão Frutuoso, José Machado, Manuel Santos, Filipe Portela, António Abelha
2013 Procedia Technology - Elsevier  
Prioritizing requirements is also important, since most projects have more requirements than those that are possible to develop.  ...  To develop it, there were used several elicitation and prioritization techniques. It was also done a study of the mobile development technologies.  ...  the requirements from stakeholders and other sources.  ... 
doi:10.1016/j.protcy.2013.12.133 fatcat:7b4dzhtztfav7eji6pzkahmmvm

A Survey of Gene Prioritization Tools for Mendelian and Complex Human Diseases

Olga Zolotareva, Maren Kleine
2019 Journal of Integrative Bioinformatics  
In this article, we explain the gene prioritization problem and provide an overview of computational tools for gene prioritization.  ...  Among about a hundred of published gene prioritization tools, we select and briefly describe 14 most up-to-date and user-friendly.  ...  Acknowledgements This study was supported by the International DFG Research Training Group GRK 1906 and the Volkswagen Stiftung Trilateral Partnerships -Cooperation Projects between Scholars and Scientists from  ... 
doi:10.1515/jib-2018-0069 pmid:31494632 pmcid:PMC7074139 fatcat:qpoodgiheja6rjjqonxsdlicdi

PGA

Chaithan Prakash, Ying Zhang, Jeongkeun Lee, Yoshio Turner, Joon-Myung Kang, Aditya Akella, Sujata Banerjee, Charles Clark, Yadi Ma, Puneet Sharma
2015 Computer communication review  
Besides supporting ACL policies, PGA also models and composes service chaining policies, i.e., the sequence of middleboxes to be traversed, by merging multiple service chain requirements into conflict-free  ...  Yet existing policy abstractions and frameworks do not support natural expression and automatic composition of high-level policies from diverse sources.  ...  The UI and composer utilize additional information (e.g., tenant hierarchies, tenant/endpoint locations) from external sources to assist in the policy specification and eager composition.  ... 
doi:10.1145/2829988.2787506 fatcat:ydioxnybrzgyzkhr3doluyjb6m

PGA

Chaithan Prakash, Ying Zhang, Jeongkeun Lee, Yoshio Turner, Joon-Myung Kang, Aditya Akella, Sujata Banerjee, Charles Clark, Yadi Ma, Puneet Sharma
2015 Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication - SIGCOMM '15  
Besides supporting ACL policies, PGA also models and composes service chaining policies, i.e., the sequence of middleboxes to be traversed, by merging multiple service chain requirements into conflict-free  ...  Yet existing policy abstractions and frameworks do not support natural expression and automatic composition of high-level policies from diverse sources.  ...  The UI and composer utilize additional information (e.g., tenant hierarchies, tenant/endpoint locations) from external sources to assist in the policy specification and eager composition.  ... 
doi:10.1145/2785956.2787506 dblp:conf/sigcomm/PrakashLTKABCMS15 fatcat:zwjscdk3tff33ip3hokz6wlcya

Communication channel prioritization in a publish-subscribe architecture [article]

Ali Paikan, Daniele Domenichelli, Lorenzo Natale
2016 arXiv   pre-print
The approach simply leverages the operating system functionalities to provide a framework where specific communication channels can be prioritized at run-time.  ...  ACKNOWLEDGEMENTS The research leading to these results has received funding from the European Union Seventh Framework Programme [FP7-ICT-2013-10] under grant agreements n.611832, WALKMAN.  ...  This allows events that require immediate reaction from a specific subscriber to be delivered in a prioritized manner.  ... 
arXiv:1504.02128v2 fatcat:qckgn6qtxncmlbibzc34k7lgjm

Model-based test case prioritization using cluster analysis: a soft-computing approach

Nida GÖKÇE, Fevzi BELLİ, Mübariz EMİNLİ, Bekir Taner DİNÇER
2015 Turkish Journal of Electrical Engineering and Computer Sciences  
The suggested approach is model-based, so it does not necessitate the availability of the source code of the SUT.  ...  It differs from existing approaches also in that it needs no prior information about the tests carried out before.  ...  ., to multiple-metrics-based testing where a family of software measures is used to generate tests.  ... 
doi:10.3906/elk-1209-109 fatcat:3uehuhxujrduvdmy6lz47xrbiu

GeneTIER: prioritization of candidate disease genes using tissue-specific gene expression profiles

Agne Antanaviciute, Catherine Daly, Laura A. Crinnion, Alexander F. Markham, Christopher M. Watson, David T. Bonthron, Ian M. Carr
2015 Bioinformatics  
Computational gene prioritization presents itself as a solution to this problem, systematically analyzing and sorting each gene from the most to least likely to be the diseasecausing gene, in a fraction  ...  GeneTIER replaces knowledge-based inference traditionally used in candidate disease gene prioritization applications with experimental data from tissuespecific gene expression datasets and thus largely  ...  on a consensus from multiple data sources.  ... 
doi:10.1093/bioinformatics/btv196 pmid:25861967 pmcid:PMC4528628 fatcat:thqa7gdsfve6nm7mzluw3ibuey

Text Mining in Cancer Gene and Pathway Prioritization

Yuan Luo, Gregory Riedlinger, Peter Szolovits
2014 Cancer Informatics  
A multitude of gene prioritization tools have been developed, each integrating different data sources covering gene sequences, differential expressions, function annotations, gene regulations, protein  ...  algorithms may improve the overall prioritization task and where prioritizing the pathways may be more desirable than prioritizing only genes.  ...  GR contributed to writing the section of data sources for gene and pathway prioritization.  ... 
doi:10.4137/cin.s13874 pmid:25392685 pmcid:PMC4216063 fatcat:mtk6jnyvxjbntedeioojlmrq3u

Using Context Awareness to Improve Quality of Information Retrieval in Pervasive Computing [chapter]

Joseph P. Loyall, Richard E. Schantz
2009 Lecture Notes in Computer Science  
Publish-subscribe-query information broker middleware offers great promise to users of pervasive computing systems requiring access to information.  ...  Too specific a request might return no results, while too broad a request might overwhelm the user with a combination of useless and buried useful information.  ...  Conversely, if he crafts a request that asks for imagery in a specific timeframe, location, or from particular sources, he might receive no information.  ... 
doi:10.1007/978-3-642-10265-3_29 fatcat:44t5acpa2zdtvhb2j3ybmnoaam

A study on decision support agent software for project management

Shinji MOCHIDA
2014 International journal of biomedical soft computing and human sciences  
moni- toring the larger work situation, it seems possible to de- velop a function which could create hierarchical knewledge by flexibly combining data from multiple sources.  ...  to work simultaneously on different prejects and are unaware of each other's re- source requirements, If this trial system could register the knowledge automatically from the data stream by  ... 
doi:10.24466/ijbschs.19.2_27 fatcat:6zvixarvnzesppjzxgyaberqdi

Open-Source Platform for Language Service Sharing

Yohei Murakami, Masahiro Tanaka, Donghui Lin, Toru Ishida
2011 International Joint Conference on Natural Language Processing  
Users can also create new services to support their intercultural/multilingual activities by composing various language services.  ...  To this end, we have developed an open-source platform consisting of two types of components: core components and optional components.  ...  From a technical point of view, as in any system development project, there are some technical requirements raised by the open-source community. The first one is performance.  ... 
dblp:conf/ijcnlp/MurakamiTLI11 fatcat:nyur5ait6jgpta4wjo46szvewu

Research Trends in Wireless Visual Sensor Networks When Exploiting Prioritization

Daniel Costa, Luiz Guedes, Francisco Vasques, Paulo Portugal
2015 Sensors  
Moreover, we envisage some research trends when exploiting prioritization, potentially fostering the development of promising optimizations for wireless sensor networks composed of visual sensors.  ...  In this context, the resource-constrained nature of sensor nodes has demanded the use of prioritization approaches as a practical mechanism to lower the transmission burden of visual data over wireless  ...  This article is originated from the discussions and research works of the authors in the last few years, especially concerning priority-based optimizations.  ... 
doi:10.3390/s150101760 pmid:25599425 pmcid:PMC4327102 fatcat:ogq6puewrfgn5ke2jym5c2nd4q
« Previous Showing results 1 — 15 out of 73,884 results