Browsing Department of Informatics by Title
Now showing items 243-262 of 927
-
EDAM: an ontology of bioinformatics operations, types of data and identifiers, topics and formats
(Peer reviewed; Journal article, 2013)Motivation: Advancing the search, publication and integration of bioinformatics tools and resources demands consistent machine-understandable descriptions. A comprehensive ontology allowing such descriptions is therefore ... -
EDAM: the bioscientific data analysis ontology (update 2021) [version 1; not peer reviewed]
(Others, 2021)EDAM [1] is a domain ontology of data analysis and data management in bio- and other sciences, and science-based applications. It comprises concepts related to analysis, modelling, optimisation, and data life-cycle. ... -
EDAM: the ontology of bioinformatics operations, topics, data, and formats (update 2020)
(Others, 2020)Project website: http://edamontology.org Source code: https://github.com/edamontology/edamontology License: CC BY-SA 4.0 EDAM is an ontology of well-established, familiar concepts that are prevalent within bioinformatics, ... -
Editing to Eulerian Graphs
(Journal article; Peer reviewed, 2014)We investigate the problem of modifying a graph into a connected graph in which the degree of each vertex satisfies a prescribed parity constraint. Let ea, ed and vd denote the operations edge addition, edge deletion and ... -
Efficient CRISPR-Cas9-mediated generation of knockin human pluripotent stem cells lacking undesired mutations at the targeted locus
(Peer reviewed; Journal article, 2015-05)The CRISPR-Cas9 system has the potential to revolutionize genome editing in human pluripotent stem cells (hPSCs), but its advantages and pitfalls are still poorly understood. We systematically tested the ability of CRISPR-Cas9 ... -
Efficient hash maps to G2 on BLS curves
(Journal article; Peer reviewed, 2022)When a pairing e:G1×G2→GT, on an elliptic curve E defined over a finite field Fq, is exploited for an identity-based protocol, there is often the need to hash binary strings into G1 and G2. Traditionally, if E admits a ... -
Efficient implementation of LowMC in HElib
(Master thesis, 2018-06-19)LowMC is a symmetric block cipher designed for fully homomorphic encryption. This thesis focuses on Martin Albrecht’s implementation of the cipher in the FHE library HElib, and how his implementation can be improved when ... -
Efficient Minimum Weight Vertex Cover Heuristics Using Graph Neural Networks
(Journal article; Peer reviewed, 2022)Minimum weighted vertex cover is the NP-hard graph problem of choosing a subset of vertices incident to all edges such that the sum of the weights of the chosen vertices is minimum. Previous efforts for solving this in ... -
Efficiently Locating Schema Incompatibilities in an eXtensible Markup Language
(Master thesis, 2003) -
Efforts towards accessible and reliable bioinformatics
(Doctoral thesis, 2015-11-19)The aim of the presented work was contributing to making scientific computing more accessible, reliable, and thus more efficient for researchers, primarily computational biologists and molecular biologists. Many approaches ... -
Elastic Grid Resources using Cloud Technologies
(Master thesis, 2014-06-02)A Large Ion Collider Experiment (ALICE) is one of four experiments at the Large Hadron Collider (LHC) at CERN. The detectors in the ALICE experiment produce data at a rate of 4 GB/s after being filtered and compressed ... -
The EMBRACE web service collection
(Peer reviewed; Journal article, 2010-05-10)The EMBRACE (European Model for Bioinformatics Research and Community Education) web service collection is the culmination of a 5-year project that set out to investigate issues involved in developing and deploying web ... -
Emerging Era of Biomolecular Membrane Simulations: Automated Physically-Justified Force Field Development and Quality-Evaluated Databanks
(Journal article; Peer reviewed, 2022)Molecular simulations of biological membranes and proxies thereof are entering a new era characterized by several key aspects. Progress starts with the realization that the outcome of the simulations can only be as good ... -
Employing Deep Learning for Fish Recognition
(Master thesis, 2018-08-21)Underwater imagery processing is in high demand, but the unrestricted environment makes it difficult to develop methods for analyzing it. Not only is obtaining a dataset for a single species difficult, but there are reported ... -
Enabling unstructured-mesh computation on massively tiled AI processors: An example of accelerating in silico cardiac simulation
(Journal article; Peer reviewed, 2023)A new trend in processor architecture design is the packaging of thousands of small processor cores into a single device, where there is no device-level shared memory but each core has its own local memory. Thus, both the ... -
Encoding and decoding of several optimal rank metric codes
(Journal article; Peer reviewed, 2022)This paper presents encoding and decoding algorithms for several families of optimal rank metric codes whose codes are in restricted forms of symmetric, alternating and Hermitian matrices. First, we show the evaluation ... -
Energy-scale Aware Feature Extraction for Flow Visualization
(Peer reviewed; Journal article, 2011)In the visualization of flow simulation data, feature detectors often tend to result in overly rich response, making some sort of filtering or simplification necessary to convey meaningful images. In this paper we present ... -
Enhancing Content Management in DPG
(Master thesis, 2013-11-20)This thesis analyzes the usability aspects of PCE and implements a new Single Page Application that attempts to solve this issues -
Enhancing Dementia Diagnosis through Mobile Technology -Development and Evaluation of a Cognitive Assessment Application
(Master thesis, 2023-12-01) -
An Ensemble Feature Selection Framework Integrating Stability
(Chapter; Peer reviewed, 2019)Ensemble feature selection has drawn more and more attention in recent years. There are mainly two strategies for ensemble feature selection, namely data perturbation and function perturbation. Data perturbation performs ...