Results 1 - 10
of
2,264
Functional discovery via a compendium of expression profiles.
- Cell,
, 2000
"... provided that the cellular transcriptional response to frames encode proteins required for sterol metabodisruption of different steps in the same pathway is lism, cell wall function, mitochondrial respiration, or similar, and that there are sufficiently unique transcripprotein synthesis. We also sh ..."
Abstract
-
Cited by 547 (9 self)
- Add to MetaCart
dyclonine. sion measurement. Using a comprehensive database of reference profiles, the pathway(s) perturbed by an Introduction uncharacterized mutation would be ascertained by simply asking which expression patterns in the database Systematic approaches for identifying the biological its profile most
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract
-
Cited by 622 (2 self)
- Add to MetaCart
of conceptual tools that are directly useful in guiding the implementation and evaluation of work redesign projects. In the paragraphs to follow, we examine several existing theoretical approaches to work redesign, with a special eye toward the measurability of the concepts employed and the action implications
Efficient Identification of Web Communities
- IN SIXTH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING
, 2000
"... We define a community on the web as a set of sites that have more links (in either direction) to members of the community than to non-members. Members of such a community can be eciently identified in a maximum flow / minimum cut framework, where the source is composed of known members, and the sink ..."
Abstract
-
Cited by 293 (13 self)
- Add to MetaCart
that identify hubs, authorities, web rings, and other link topologies that are useful but not easily categorized. Applications of our approach include focused crawlers and search engines, automatic population of portal categories, and improved filtering.
Interactive Motion Generation from Examples
, 2002
"... There are many applications that demand large quantities of natural looking motion. It is difficult to synthesize motion that looks natural, particularly when it is people who must move. In this paper, we present a framework that generates human motions by cutting and pasting motion capture data. Se ..."
Abstract
-
Cited by 281 (12 self)
- Add to MetaCart
. Selecting a collection of clips that yields an acceptable motion is a combinatorial problem that we manage as a randomized search of a hierarchy of graphs. This approach can generate motion sequences that satisfy a variety of constraints automatically. The motions are smooth and human
A graph-based system for network-vulnerability analysis
- in Proceedings of the 1998 workshop on New security paradigms
, 1998
"... caphill @ sandia..qov This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences follow ..."
Abstract
-
Cited by 168 (0 self)
- Add to MetaCart
caphill @ sandia..qov This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences
ArnetMiner: Extraction and Mining of Academic Social Networks
"... This paper addresses several key issues in the ArnetMiner system, which aims at extracting and mining academic social networks. Specifically, the system focuses on: 1) Extracting researcher profiles automatically from the Web; 2) Integrating the publication data into the network from existing digita ..."
Abstract
-
Cited by 203 (46 self)
- Add to MetaCart
digital libraries; 3) Modeling the entire academic network; and 4) Providing search services for the academic network. So far, 448,470 researcher profiles have been extracted using a unified tagging approach. We integrate publications from online Web databases and propose a probabilistic framework to deal
Reverse engineering of regulatory networks in human B cells.
- Nat. Genet.
, 2005
"... Cellular phenotypes are determined by the differential activity of networks linking coregulated genes. Available methods for the reverse engineering of such networks from genome-wide expression profiles have been successful only in the analysis of lower eukaryotes with simple genomes. Using a new m ..."
Abstract
-
Cited by 178 (2 self)
- Add to MetaCart
Cellular phenotypes are determined by the differential activity of networks linking coregulated genes. Available methods for the reverse engineering of such networks from genome-wide expression profiles have been successful only in the analysis of lower eukaryotes with simple genomes. Using a new
Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.
- Journal of Personality and Social Psychology,
, 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract
-
Cited by 183 (19 self)
- Add to MetaCart
the motivational model with the supportive evidence. A Motivational Model of High School Dropout The motivational model is depicted in Motivation Toward School One motivational approach that has been found useful in education posits that behavior can be intrinsically or extrinsically motivated Much research
Entityauthority: Semantically enriched graph-based authority propagation
- In Proceedings of 10th International Workshop on Web and Databases (WebDB 2007
, 2007
"... This paper pursues the recently emerging paradigm of searching for entities that are embedded in Web pages. We utilize informationextraction techniques to identify entity candidates in documents, map them onto entries in a richly structured ontology, and derive a generalized data graph that encompas ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
the mutual reinforcement between authoritative pages and important entities. This resembles the HITS method for Web-graph link analysis and recently proposed ObjectRank methods, but our approach operates on a much richer, typed graph structure with different kinds of nodes and also differs in the underlying
The Query-flow Graph: Model and Applications
, 2008
"... Query logs record the queries and the actions of the users of search engines, and as such they contain valuable information about the interests, the preferences, and the behavior of the users, as well as their implicit feedback to search-engine results. Mining the wealth of information available in ..."
Abstract
-
Cited by 112 (19 self)
- Add to MetaCart
is an outcome of query-log mining and, at the same time, a useful tool for it. We propose a methodology that builds such a graph by mining time and textual information as well as aggregating queries from different users. Using this approach we build a real-world queryflow graph from a large-scale query log
Results 1 - 10
of
2,264