Blar i Department of Informatics på tittel
Viser treff 380-399 av 1125
-
Feature Selection for Identification of Transcriptome and Clinical Biomarkers for Relapse in Colon Cancer
(Master thesis, 2021-06-01)This study attempts to find good predictive biomarkers for recurrence in colon cancer between two data sources of both mRNA and miRNA expression from frozen tumor samples. In total four datasets, two data sources and two ... -
Features impacting the mesopelagic layer in the ocean: a machine learning-based approach
(Master thesis, 2022-09-01)Context: Recently the United Nations proclaimed a Decade of Ocean Science for Sustainable Development (2021–2030) due to threats to the productivity and health of the ocean due to human impact. The One Ocean Expedition ... -
Filtering duplicate reads from 454 pyrosequencing data
(Peer reviewed; Journal article, 2013)Motivation: Throughout the recent years, 454 pyrosequencing has emerged as an efficient alternative to traditional Sanger sequencing and is widely used in both de novo whole-genome sequencing and metagenomics. Especially ... -
Filtering of FTLE for Visualizing Spatial Separation in Unsteady 3D Flow
(Peer reviewed; Journal article, 2012)In many cases, feature detection for flow visualization is structured in two phases: first candidate identification, and then filtering. With this paper, we propose to use the directional information contained in the ... -
Finding Common Grounds: The Moral Machine Case
(Master thesis, 2023-03-06) -
Finding even subgraphs even faster
(Peer reviewed; Journal article, 2015)Problems of the following kind have been the focus of much recent research in the realm of parameterized complexity: Given an input graph (digraph) on n vertices and a positive integer parameter k, find if there exist k ... -
Finding haplotypic signatures in proteins
(Journal article; Peer reviewed, 2023)Background The nonrandom distribution of alleles of common genomic variants produces haplotypes, which are fundamental in medical and population genetic studies. Consequently, protein-coding genes with different ... -
Finding Induced Subgraphs via Minimal Triangulations
(Peer reviewed; Journal article, 2010)Potential maximal cliques and minimal separators are combinatorial objects which were introduced and studied in the realm of minimal triangulation problems in- cluding Minimum Fill-in and Treewidth. We discover unexpected ... -
Finding k Disjoint Triangles in an Arbitrary Graph
(Journal article; Peer reviewed, 2004)We consider the NP-complete problem of deciding whether an input graph on n vertices has k vertex-disjoint copies of a fixed graph H. For H=K 3 (the triangle) we give an O(22klog k + 1.869k n 2) algorithm, and for general ... -
Finding Resource Bounds in the Presence of Explicit Deallocation
(Journal article, 2005-10-17)A software program requesting a resource that is not available usually raises an out-of-resource exception. Component software is software that has been assembled from standardized, reusable components which, in turn, may ... -
Finding shared RSA factors in the Certificate Transparency logs
(Master thesis, 2022-05-13)When generating RSA keys, proper random generators are crucial. If the generators are not truly random, keys may be generated with the same factors, making them vulnerable to compromise. Doing a simple greatest common ... -
Fine-grained parameterized complexity analysis of graph coloring problems
(Journal article; Peer reviewed, 2023)The q-Coloring problem asks whether the vertices of a graph can be properly colored with q colors. In this paper we perform a fine-grained analysis of the complexity of q- Coloring with respect to a hierarchy of structural ... -
Finite and Confident Teaching in Expectation: Sampling from Infinite Concept Classes
(Frontiers in Artificial Intelligence and Applications;325, Chapter, 2020)We investigate the teaching of infinite concept classes through the effect of the learning prior (which is used by the learner to derive posteriors giving preference of some concepts over others and by the teacher to devise ... -
Firewalls: Enforcement of Security Policy in networks
(Master thesis, 2014-11-20)Firewalls are set up to protect computer networks. Originally, networks were just coupled together, in order to achieve connection. With the ability to reach networks all over the world, one started to denote this the ... -
Five-weight codes from three-valued correlation of M-sequences
(Journal article; Peer reviewed, 2023)In this paper, for each of six families of three-valued m-sequence correlation, we construct an infinite family of five-weight codes from trace codes over the ring R = F2 + uF2, where u2 = 0. The trace codes have the ... -
Fixed cardinality stable sets
(Journal article; Peer reviewed, 2021)Given an undirected graph G=(V,E) and a positive integer k in {1, ..., |V|}, we initiate the combinatorial study of stable sets of cardinality exactly k in G. Our aim is to instigate the polyhedral investigation of the ... -
Fixed Parameter Set Splitting, Linear Kernel and Improved Running Time
(Journal article, 2005) -
A Fixed-Parameter Perspective on #BIS
(Peer reviewed; Journal article, 2019-07-18)The problem of (approximately) counting the independent sets of a bipartite graph (#BIS) is the canonical approximate counting problem that is complete in the intermediate complexity class #RHΠ1. It is believed that #BIS ... -
Floating Fault Analysis of Trivium
(Lecture Notes in Computer Science; 5365, Chapter; Peer reviewed, 2008)One of the eSTREAM final portfolio ciphers is the hardwareoriented stream cipher Trivium. It is based on 3 nonlinear feedback shift registers with a linear output function. Although Trivium has attached a lot of interest, ... -
Food preferences throughout the menstrual cycle – A computer-assisted neuro-endocrino-psychological investigation
(Journal article; Peer reviewed, 2022)Background As eating behavior changes in relation to the menstrual cycle and weight changes with menopausal transition, ovarian hormones appear to be involved in regulating eating behavior. However, observations are ...