Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Databases and Information Systems (42)
- Artificial Intelligence and Robotics (32)
- Graphics and Human Computer Interfaces (24)
- Other Computer Sciences (24)
- Numerical Analysis and Scientific Computing (20)
-
- Engineering (18)
- Software Engineering (18)
- Life Sciences (11)
- Mathematics (11)
- Systems Architecture (11)
- Applied Mathematics (9)
- Statistics and Probability (9)
- Bioinformatics (8)
- Numerical Analysis and Computation (7)
- OS and Networks (7)
- Social and Behavioral Sciences (7)
- Information Security (6)
- Computer Engineering (5)
- Electrical and Computer Engineering (5)
- Genetics and Genomics (5)
- Business (4)
- Operations Research, Systems Engineering and Industrial Engineering (4)
- Other Applied Mathematics (4)
- Biochemistry, Biophysics, and Structural Biology (3)
- Communication (3)
- Computational Linguistics (3)
- Computer and Systems Architecture (3)
- Institution
-
- Singapore Management University (41)
- University of Dayton (14)
- Selected Works (12)
- Western University (6)
- University of Massachusetts Amherst (5)
-
- Florida International University (4)
- Nova Southeastern University (4)
- University of Nebraska - Lincoln (3)
- Bard College (2)
- Georgia State University (2)
- University of Kentucky (2)
- University of Nevada, Las Vegas (2)
- Ursinus College (2)
- Utah State University (2)
- Virginia Commonwealth University (2)
- Ateneo de Manila University (1)
- Boise State University (1)
- COBRA (1)
- Cal Poly Humboldt (1)
- California State University, San Bernardino (1)
- Cedarville University (1)
- Central Washington University (1)
- City University of New York (CUNY) (1)
- Colby College (1)
- Dakota State University (1)
- Dartmouth College (1)
- East Tennessee State University (1)
- Embry-Riddle Aeronautical University (1)
- Illinois Wesleyan University (1)
- Kennesaw State University (1)
- Keyword
-
- Algorithms (8)
- Algorithm (6)
- Optimization (4)
- Artificial intelligence (3)
- Computer science (3)
-
- Evolution (3)
- Genetic Algorithm (3)
- Performance (3)
- Answer Set Programming and Solving (2)
- Automated Reasoning (2)
- Casino floor optimization (2)
- Clustering (2)
- Constraint Answer Set Programming (2)
- Cyberbullying (2)
- Decision making (2)
- Design (2)
- Detection (2)
- Evolutionary computing (2)
- Generative model (2)
- Genetic algorithm (2)
- Machine learning (2)
- Miller-Rabin (2)
- Navigation (2)
- Network (2)
- Non-linear data modeling (2)
- Online learning (2)
- Strong liar (2)
- Strong pseudoprime (2)
- Wind energy (2)
- 0ex; Concept bank (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (38)
- MAICS: The Modern Artificial Intelligence and Cognitive Science Conference (12)
- Doctoral Dissertations (5)
- Electronic Thesis and Dissertation Repository (5)
- CCE Theses and Dissertations (4)
-
- FIU Electronic Theses and Dissertations (4)
- Saverio Perugini (4)
- Electronic Theses and Dissertations (3)
- Vijayan K. Asari (3)
- Yuliya Lierler (3)
- Computer Science Faculty and Staff Publications (2)
- Computer Science Summer Fellows (2)
- Georgia State Undergraduate Research Conference (2)
- Honors Theses (2)
- International Conference on Gambling & Risk Taking (2)
- Research Collection Lee Kong Chian School Of Business (2)
- School of Computing: Faculty Publications (2)
- Senior Projects Spring 2016 (2)
- Theses and Dissertations (2)
- Theses and Dissertations--Computer Science (2)
- All Faculty Scholarship for the College of the Sciences (1)
- Andrew Shallue (1)
- Biomedical Sciences ETDs (1)
- Boise State University Theses and Dissertations (1)
- COBRA Preprint Series (1)
- Cal Poly Humboldt theses and projects (1)
- Computer Science Faculty Publications (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Content presented at the MAICS conference (1)
- Dartmouth Scholarship (1)
- Publication Type
- File Type
Articles 1 - 30 of 132
Full-Text Articles in Theory and Algorithms
Fast Fourier Transforms Over Prime Fields Of Large Characteristic And Their Implementation On Graphics Processing Units, Davood Mohajerani
Fast Fourier Transforms Over Prime Fields Of Large Characteristic And Their Implementation On Graphics Processing Units, Davood Mohajerani
Electronic Thesis and Dissertation Repository
Prime field arithmetic plays a central role in computer algebra and supports computation in Galois fields which are essential to coding theory and cryptography algorithms. The prime fields that are used in computer algebra systems, in particular in the implementation of modular methods, are often of small characteristic, that is, based on prime numbers that fit on a machine word. Increasing precision beyond the machine word size can be done via the Chinese Remaindering Theorem or Hensel Lemma. In this thesis, we consider prime fields of large characteristic, typically fitting on n machine words, where n is a power of …
Spatial Data Mining Analytical Environment For Large Scale Geospatial Data, Zhao Yang
Spatial Data Mining Analytical Environment For Large Scale Geospatial Data, Zhao Yang
University of New Orleans Theses and Dissertations
Nowadays, many applications are continuously generating large-scale geospatial data. Vehicle GPS tracking data, aerial surveillance drones, LiDAR (Light Detection and Ranging), world-wide spatial networks, and high resolution optical or Synthetic Aperture Radar imagery data all generate a huge amount of geospatial data. However, as data collection increases our ability to process this large-scale geospatial data in a flexible fashion is still limited. We propose a framework for processing and analyzing large-scale geospatial and environmental data using a “Big Data” infrastructure. Existing Big Data solutions do not include a specific mechanism to analyze large-scale geospatial data. In this work, we extend …
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Electronic Thesis and Dissertation Repository
Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and …
Algorithm For Premature Ventricular Contraction Detection From A Subcutaneous Electrocardiogram Signal, Iris Lynn Shelly
Algorithm For Premature Ventricular Contraction Detection From A Subcutaneous Electrocardiogram Signal, Iris Lynn Shelly
Dissertations and Theses
Cardiac arrhythmias occur when the normal pattern of electrical signals in the heart breaks down. A premature ventricular contraction (PVC) is a common type of arrhythmia that occurs when a heartbeat originates from an ectopic focus within the ventricles rather than from the sinus node in the right atrium. This and other arrhythmias are often diagnosed with the help of an electrocardiogram, or ECG, which records the electrical activity of the heart using electrodes placed on the skin. In an ECG signal, a PVC is characterized by both timing and morphological differences from a normal sinus beat.
An implantable cardiac …
Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper
Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper
Sprague Library Scholarship and Creative Works
No abstract provided.
The History Of Algorithmic Complexity, Audrey A. Nasar
The History Of Algorithmic Complexity, Audrey A. Nasar
Publications and Research
This paper provides a historical account of the development of algorithmic complexity in a form that is suitable to instructors of mathematics at the high school or undergraduate level. The study of algorithmic complexity, despite being deeply rooted in mathematics, is usually restricted to the computer science curriculum. By providing a historical account of algorithmic complexity through a mathematical lens, this paper aims to equip mathematics educators with the necessary background and framework for incorporating the analysis of algorithmic complexity into mathematics courses as early on as algebra or pre-calculus.
Massively Parallel Algorithm For Solving The Eikonal Equation On Multiple Accelerator Platforms, Anup Shrestha
Massively Parallel Algorithm For Solving The Eikonal Equation On Multiple Accelerator Platforms, Anup Shrestha
Boise State University Theses and Dissertations
The research presented in this thesis investigates parallel implementations of the Fast Sweeping Method (FSM) for Graphics Processing Unit (GPU)-based computational plat forms and proposes a new parallel algorithm for distributed computing platforms with accelerators. Hardware accelerators such as GPUs and co-processors have emerged as general- purpose processors in today’s high performance computing (HPC) platforms, thereby increasing platforms’ performance capabilities. This trend has allowed greater parallelism and substantial acceleration of scientific simulation software. In order to leverage the power of new HPC platforms, scientific applications must be written in specific lower-level programming languages, which used to be platform specific. Newer …
Processing Incomplete K Nearest Neighbor Search, Xiaoye Miao, Yunjun Gao, Gang Chen, Baihua Zheng, Huiyong Cui
Processing Incomplete K Nearest Neighbor Search, Xiaoye Miao, Yunjun Gao, Gang Chen, Baihua Zheng, Huiyong Cui
Research Collection School Of Computing and Information Systems
Given a setS of multidimensional objects and a query object q, a k nearest neighbor (kNN) query finds from S the k closest objects to q. This query is a fundamental problem in database, data mining, and information retrieval research. It plays an important role in a wide spectrum of real applications such as image recognition and location-based services. However, due to the failure of data transmission devices, improper storage, and accidental loss, incomplete data exist widely in those applications, where some dimensional values of data items are missing. In this paper, we systematically study incomplete k nearest neighbor (IkNN) …
Answering Why-Not And Why Questions On Reverse Top-K Queries, Qing Liu, Yunjun Gao, Gang Chen, Baihua Zheng, Linlin Zhou
Answering Why-Not And Why Questions On Reverse Top-K Queries, Qing Liu, Yunjun Gao, Gang Chen, Baihua Zheng, Linlin Zhou
Research Collection School Of Computing and Information Systems
Why-not and why questions can be posed by database users to seek clarifications on unexpected query results. Specifically, why-not questions aim to explain why certain expected tuples are absent from the query results, while why questions try to clarify why certain unexpected tuples are present in the query results. This paper systematically explores the why-not and why questions on reverse top-k queries, owing to its importance in multi-criteria decision making. We first formalize why-not questions on reverse top-k queries, which try to include the missing objects in the reverse top-k query results, and then, we propose a unified framework called …
What Is Answer Set Programming To Propositional Satisfiability, Yuliya Lierler
What Is Answer Set Programming To Propositional Satisfiability, Yuliya Lierler
Yuliya Lierler
Network Inference Driven Drug Discovery, Gergely Zahoránszky-Kőhalmi, Tudor I. Oprea Md, Phd, Cristian G. Bologa Phd, Subramani Mani Md, Phd, Oleg Ursu Phd
Network Inference Driven Drug Discovery, Gergely Zahoránszky-Kőhalmi, Tudor I. Oprea Md, Phd, Cristian G. Bologa Phd, Subramani Mani Md, Phd, Oleg Ursu Phd
Biomedical Sciences ETDs
The application of rational drug design principles in the era of network-pharmacology requires the investigation of drug-target and target-target interactions in order to design new drugs. The presented research was aimed at developing novel computational methods that enable the efficient analysis of complex biomedical data and to promote the hypothesis generation in the context of translational research. The three chapters of the Dissertation relate to various segments of drug discovery and development process.
The first chapter introduces the integrated predictive drug discovery platform „SmartGraph”. The novel collaborative-filtering based algorithm „Target Based Recommender (TBR)” was developed in the framework of this …
Applications Of Sampling And Estimation On Networks, Fabricio Murai Ferreira
Applications Of Sampling And Estimation On Networks, Fabricio Murai Ferreira
Doctoral Dissertations
Networks or graphs are fundamental abstractions that allow us to study many important real systems, such as the Web, social networks and scientific collaboration. It is impossible to completely understand these systems and answer fundamental questions related to them without considering the way their components are connected, i.e., their topology. However, topology is not the only relevant aspect of networks. Nodes often have information associated with them, which can be regarded as node attributes or labels. An important problem is then how to characterize a network w.r.t. topology and node label distributions. Another important problem is how to design efficient …
Towards Learning And Verifying Invariants Of Cyber-Physical Systems By Code Mutation, Yuqi Chen, Christopher M. Poskitt, Jun Sun
Towards Learning And Verifying Invariants Of Cyber-Physical Systems By Code Mutation, Yuqi Chen, Christopher M. Poskitt, Jun Sun
Research Collection School Of Computing and Information Systems
Cyber-physical systems (CPS), which integrate algorithmic control with physical processes, often consist of physically distributed components communicating over a network. A malfunctioning or compromised component in such a CPS can lead to costly consequences, especially in the context of public infrastructure. In this short paper, we argue for the importance of constructing invariants (or models) of the physical behaviour exhibited by CPS, motivated by their applications to the control, monitoring, and attestation of components. To achieve this despite the inherent complexity of CPS, we propose a new technique for learning invariants that combines machine learning with ideas from mutation testing. …
Marim: Mobile Augmented Reality For Interactive Manuals, Tam Nguyen, Dorothy Tan, Bilal Mirza, Jose Sepulveda
Marim: Mobile Augmented Reality For Interactive Manuals, Tam Nguyen, Dorothy Tan, Bilal Mirza, Jose Sepulveda
Tam Nguyen
In this work, we present a practical system which uses mobile devices for interactive manuals. In particular, there are two modes provided in the system, namely, expert/trainer and trainee modes. Given the expert/trainer editor, experts design the step-by-step interactive manuals. For each step, the experts capture the images by using phones/tablets and provide visual instructions such as interest regions, text, and action animations. In the trainee mode, the system utilizes the existing object detection and tracking algorithms to identify the step scene and retrieve the respective instruction to be displayed on the mobile device. The trainee then follows the displayed …
Stochastic Network Design: Models And Scalable Algorithms, Xiaojian Wu
Stochastic Network Design: Models And Scalable Algorithms, Xiaojian Wu
Doctoral Dissertations
Many natural and social phenomena occur in networks. Examples include the spread of information, ideas, and opinions through a social network, the propagation of an infectious disease among people, and the spread of species within an interconnected habitat network. The ability to modify a phenomenon towards some desired outcomes has widely recognized benefits to our society and the economy. The outcome of a phenomenon is largely determined by the topology or properties of its underlying network. A decision maker can take management actions to modify a network and, therefore, change the outcome of the phenomenon. A management action is an …
Large Scale Data Mining For It Service Management, Chunqiu Zeng
Large Scale Data Mining For It Service Management, Chunqiu Zeng
FIU Electronic Theses and Dissertations
More than ever, businesses heavily rely on IT service delivery to meet their current and frequently changing business requirements. Optimizing the quality of service delivery improves customer satisfaction and continues to be a critical driver for business growth. The routine maintenance procedure plays a key function in IT service management, which typically involves problem detection, determination and resolution for the service infrastructure.
Many IT Service Providers adopt partial automation for incident diagnosis and resolution where the operation of the system administrators and automation operation are intertwined. Often the system administrators' roles are limited to helping triage tickets to the processing …
Partitioning Uncertain Workloads, Freddy Chua, Bernardo A. Huberman
Partitioning Uncertain Workloads, Freddy Chua, Bernardo A. Huberman
Research Collection School Of Computing and Information Systems
We present a method for determining the ratio of the tasks when breaking any complex workload in such a way that once the outputs from all tasks are joined, their full completion takes less time and exhibit smaller variance than when running on the undivided workload. To do that, we have to infer the capabilities of the processing unit executing the divided workloads or tasks. We propose a Bayesian Inference algorithm to infer the amount of time each task takes in a way that does not require prior knowledge on the processing unit capability. We demonstrate the effectiveness of this …
Finding Causality And Responsibility For Probabilistic Reverse Skyline Query Non-Answers, Yunjun Gao, Qing Liu, Gang Cheng, Linlin Zhou, Baihua Zheng
Finding Causality And Responsibility For Probabilistic Reverse Skyline Query Non-Answers, Yunjun Gao, Qing Liu, Gang Cheng, Linlin Zhou, Baihua Zheng
Research Collection School Of Computing and Information Systems
Causality and responsibility is an essential tool in the database community for providing intuitive explanations for answers/non-answers to queries. Causality denotes the causes for the answers/non-answers to queries, and responsibility represents the degree of a cause which reflects its influence on the answers/non-answers to queries. In this paper, we study the causality and responsibility problem (CRP) for the non-answers to probabilistic reverse skyline queries (PRSQ). We first formalize CRP on PRSQ, and then, we propose an efficient algorithm termed as CP to compute the causality and responsibility for the non-answers to PRSQ. CP first finds candidate causes, and then, it …
A Survey On Wireless Indoor Localization From The Device Perspective, Jiang Xiao, Zimu Zhou, Youwen Yi, Lionel M. Ni
A Survey On Wireless Indoor Localization From The Device Perspective, Jiang Xiao, Zimu Zhou, Youwen Yi, Lionel M. Ni
Research Collection School Of Computing and Information Systems
With the marvelous development of wireless techniques and ubiquitous deployment of wireless systems indoors, myriad indoor location-based services (ILBSs) have permeated into numerous aspects of modern life. The most fundamental functionality is to pinpoint the location of the target via wireless devices. According to how wireless devices interact with the target, wireless indoor localization schemes roughly fall into two categories: device based and device free. In device-based localization, a wireless device (e.g., a smartphone) is attached to the target and computes its location through cooperation with other deployed wireless devices. In device-free localization, the target carries no wireless devices, while …
State Preserving Extreme Learning Machine For Face Recognition, Md. Zahangir Alom, Paheding Sidike, Vijayan K. Asari, Tarek M. Taha
State Preserving Extreme Learning Machine For Face Recognition, Md. Zahangir Alom, Paheding Sidike, Vijayan K. Asari, Tarek M. Taha
Vijayan K. Asari
Extreme Learning Machine (ELM) has been introduced as a new algorithm for training single hidden layer feed-forward neural networks (SLFNs) instead of the classical gradient-based algorithms. Based on the consistency property of data, which enforce similar samples to share similar properties, ELM is a biologically inspired learning algorithm with SLFNs that learns much faster with good generalization and performs well in classification applications. However, the random generation of the weight matrix in current ELM based techniques leads to the possibility of unstable outputs in the learning and testing phases. Therefore, we present a novel approach for computing the weight matrix …
Efficient Thermal Image Segmentation Through Integration Of Nonlinear Enhancement With Unsupervised Active Contour Model, Fatema Albalooshi, Evan Krieger, Paheding Sidike, Vijayan K. Asari
Efficient Thermal Image Segmentation Through Integration Of Nonlinear Enhancement With Unsupervised Active Contour Model, Fatema Albalooshi, Evan Krieger, Paheding Sidike, Vijayan K. Asari
Vijayan K. Asari
Thermal images are exploited in many areas of pattern recognition applications. Infrared thermal image segmentation can be used for object detection by extracting regions of abnormal temperatures. However, the lack of texture and color information, low signal-to-noise ratio, and blurring effect of thermal images make segmenting infrared heat patterns a challenging task. Furthermore, many segmentation methods that are used in visible imagery may not be suitable for segmenting thermal imagery mainly due to their dissimilar intensity distributions. Thus, a new method is proposed to improve the performance of image segmentation in thermal imagery. The proposed scheme efficiently utilizes nonlinear intensity …
Gaussian Weighted Neighborhood Connectivity Of Nonlinear Line Attractor For Learning Complex Manifolds, Theus H. Aspiras, Vijayan K. Asari, Wesam Sakla
Gaussian Weighted Neighborhood Connectivity Of Nonlinear Line Attractor For Learning Complex Manifolds, Theus H. Aspiras, Vijayan K. Asari, Wesam Sakla
Vijayan K. Asari
The human brain has the capability to process high quantities of data quickly for detection and recognition tasks. These tasks are made simpler by the understanding of data, which intentionally removes redundancies found in higher dimensional data and maps the data onto a lower dimensional space. The brain then encodes manifolds created in these spaces, which reveal a specific state of the system. We propose to use a recurrent neural network, the nonlinear line attractor (NLA) network, for the encoding of these manifolds as specific states, which will draw untrained data towards one of the specific states that the NLA …
Development Of Anatomical And Functional Magnetic Resonance Imaging Measures Of Alzheimer Disease, Samaneh Kazemifar
Development Of Anatomical And Functional Magnetic Resonance Imaging Measures Of Alzheimer Disease, Samaneh Kazemifar
Electronic Thesis and Dissertation Repository
Alzheimer disease is considered to be a progressive neurodegenerative condition, clinically characterized by cognitive dysfunction and memory impairments. Incorporating imaging biomarkers in the early diagnosis and monitoring of disease progression is increasingly important in the evaluation of novel treatments. The purpose of the work in this thesis was to develop and evaluate novel structural and functional biomarkers of disease to improve Alzheimer disease diagnosis and treatment monitoring. Our overarching hypothesis is that magnetic resonance imaging methods that sensitively measure brain structure and functional impairment have the potential to identify people with Alzheimer’s disease prior to the onset of cognitive decline. …
A Framework For Hybrid Intrusion Detection Systems, Robert N. Bronte
A Framework For Hybrid Intrusion Detection Systems, Robert N. Bronte
Master of Science in Information Technology Theses
Web application security is a definite threat to the world’s information technology infrastructure. The Open Web Application Security Project (OWASP), generally defines web application security violations as unauthorized or unintentional exposure, disclosure, or loss of personal information. These breaches occur without the company’s knowledge and it often takes a while before the web application attack is revealed to the public, specifically because the security violations are fixed. Due to the need to protect their reputation, organizations have begun researching solutions to these problems. The most widely accepted solution is the use of an Intrusion Detection System (IDS). Such systems currently …
Marim: Mobile Augmented Reality For Interactive Manuals, Tam Nguyen, Dorothy Tan, Bilal Mirza, Jose Sepulveda
Marim: Mobile Augmented Reality For Interactive Manuals, Tam Nguyen, Dorothy Tan, Bilal Mirza, Jose Sepulveda
Computer Science Faculty Publications
In this work, we present a practical system which uses mobile devices for interactive manuals. In particular, there are two modes provided in the system, namely, expert/trainer and trainee modes. Given the expert/trainer editor, experts design the step-by-step interactive manuals. For each step, the experts capture the images by using phones/tablets and provide visual instructions such as interest regions, text, and action animations. In the trainee mode, the system utilizes the existing object detection and tracking algorithms to identify the step scene and retrieve the respective instruction to be displayed on the mobile device. The trainee then follows the displayed …
Hydra: Massively Compositional Model For Cross-Project Defect Prediction, Xin Xia, David Lo, Sinno Jialin Pan, Nachiappan Nagappan, Xinyu Wang
Hydra: Massively Compositional Model For Cross-Project Defect Prediction, Xin Xia, David Lo, Sinno Jialin Pan, Nachiappan Nagappan, Xinyu Wang
Research Collection School Of Computing and Information Systems
Most software defect prediction approaches are trained and applied on data from the same project. However, often a new project does not have enough training data. Cross-project defect prediction, which uses data from other projects to predict defects in a particular project, provides a new perspective to defect prediction. In this work, we propose a HYbrid moDel Reconstruction Approach (HYDRA) for cross-project defect prediction, which includes two phases: genetic algorithm (GA) phase and ensemble learning (EL) phase. These two phases create a massive composition of classifiers. To examine the benefits of HYDRA, we perform experiments on 29 datasets from the …
Online Adaptive Passive-Aggressive Methods For Non-Negative Matrix Factorization And Its Applications, Chenghao Liu, Hoi, Steven C. H., Peilin Zhao, Jianling Sun, Ee-Peng Lim
Online Adaptive Passive-Aggressive Methods For Non-Negative Matrix Factorization And Its Applications, Chenghao Liu, Hoi, Steven C. H., Peilin Zhao, Jianling Sun, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
This paper aims to investigate efficient and scalable machine learning algorithms for resolving Non-negative Matrix Factorization (NMF), which is important for many real-world applications, particularly for collaborative filtering and recommender systems. Unlike traditional batch learning methods, a recently proposed online learning technique named "NN-PA" tackles NMF by applying the popular Passive-Aggressive (PA) online learning, and found promising results. Despite its simplicity and high efficiency, NN-PA falls short in at least two critical limitations: (i) it only exploits the first-order information and thus may converge slowly especially at the beginning of online learning tasks; (ii) it is sensitive to some key …
Constraint Cnf: A Sat And Csp Language Under One Roof, Broes De Cat, Yuliya Lierler
Constraint Cnf: A Sat And Csp Language Under One Roof, Broes De Cat, Yuliya Lierler
Yuliya Lierler
Algorithms For Glycan Structure Identification With Tandem Mass Spectrometry, Weiping Sun
Algorithms For Glycan Structure Identification With Tandem Mass Spectrometry, Weiping Sun
Electronic Thesis and Dissertation Repository
Glycosylation is a frequently observed post-translational modification (PTM) of proteins. It has been estimated over half of eukaryotic proteins in nature are glycoproteins. Glycoprotein analysis plays a vital role in drug preparation. Thus, characterization of glycans that are linked to proteins has become necessary in glycoproteomics. Mass spectrometry has become an effective analytical technique for glycoproteomics analysis because of its high throughput and sensitivity. The large amount of spectral data collected in a mass spectrometry experiment makes manual interpretation impossible and requires effective computational approaches for automated analysis. Different algorithmic solutions have been proposed to address the challenges in glycoproteomics …
Autoquery: Automatic Construction Of Dependency Queries For Code Search, Shaowei Wang, David Lo, Lingxiao Jiang
Autoquery: Automatic Construction Of Dependency Queries For Code Search, Shaowei Wang, David Lo, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
Many code search techniques have been proposed to return relevant code for a user query expressed as textual descriptions. However, source code is not mere text. It contains dependency relations among various program elements. To leverage these dependencies for more accurate code search results, techniques have been proposed to allow user queries to be expressed as control and data dependency relationships among program elements. Although such techniques have been shown to be effective for finding relevant code, it remains a question whether appropriate queries can be generated by average users. In this work, we address this concern by proposing a …