• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,264
Next 10 →

Functional discovery via a compendium of expression profiles.

by Timothy R Hughes , Matthew J Marton , Allan R Jones , Christopher J Roberts , Roland Stoughton , Christopher D Armour , Holly A Bennett , Ernest Coffey , Hongyue Dai , Ross-Macdonald , Yudong D He , Matthew J Kidd , Amy M King , Michael R Meyer , David Slade , Pek Y Lum , Sergey B Stepaniants , Daniel D Shoemaker , Julian Simon , Martin Bard - Cell, , 2000
"... provided that the cellular transcriptional response to frames encode proteins required for sterol metabodisruption of different steps in the same pathway is lism, cell wall function, mitochondrial respiration, or similar, and that there are sufficiently unique transcripprotein synthesis. We also sh ..."
Abstract - Cited by 547 (9 self) - Add to MetaCart
dyclonine. sion measurement. Using a comprehensive database of reference profiles, the pathway(s) perturbed by an Introduction uncharacterized mutation would be ascertained by simply asking which expression patterns in the database Systematic approaches for identifying the biological its profile most

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
of conceptual tools that are directly useful in guiding the implementation and evaluation of work redesign projects. In the paragraphs to follow, we examine several existing theoretical approaches to work redesign, with a special eye toward the measurability of the concepts employed and the action implications

Efficient Identification of Web Communities

by Gary William Flake, Steve Lawrence, C. Lee Giles - IN SIXTH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING , 2000
"... We define a community on the web as a set of sites that have more links (in either direction) to members of the community than to non-members. Members of such a community can be eciently identified in a maximum flow / minimum cut framework, where the source is composed of known members, and the sink ..."
Abstract - Cited by 293 (13 self) - Add to MetaCart
that identify hubs, authorities, web rings, and other link topologies that are useful but not easily categorized. Applications of our approach include focused crawlers and search engines, automatic population of portal categories, and improved filtering.

Interactive Motion Generation from Examples

by Okan Arikan, D.A. Forsyth , 2002
"... There are many applications that demand large quantities of natural looking motion. It is difficult to synthesize motion that looks natural, particularly when it is people who must move. In this paper, we present a framework that generates human motions by cutting and pasting motion capture data. Se ..."
Abstract - Cited by 281 (12 self) - Add to MetaCart
. Selecting a collection of clips that yields an acceptable motion is a combinatorial problem that we manage as a randomized search of a hierarchy of graphs. This approach can generate motion sequences that satisfy a variety of constraints automatically. The motions are smooth and human

A graph-based system for network-vulnerability analysis

by Cynthia Phillips - in Proceedings of the 1998 workshop on New security paradigms , 1998
"... caphill @ sandia..qov This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences follow ..."
Abstract - Cited by 168 (0 self) - Add to MetaCart
caphill @ sandia..qov This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences

ArnetMiner: Extraction and Mining of Academic Social Networks

by Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zhang, Zhong Su
"... This paper addresses several key issues in the ArnetMiner system, which aims at extracting and mining academic social networks. Specifically, the system focuses on: 1) Extracting researcher profiles automatically from the Web; 2) Integrating the publication data into the network from existing digita ..."
Abstract - Cited by 203 (46 self) - Add to MetaCart
digital libraries; 3) Modeling the entire academic network; and 4) Providing search services for the academic network. So far, 448,470 researcher profiles have been extracted using a unified tagging approach. We integrate publications from online Web databases and propose a probabilistic framework to deal

Reverse engineering of regulatory networks in human B cells.

by Katia Basso , Adam A Margolin , Gustavo Stolovitzky , Ulf Klein , Riccardo Dalla-Favera , Andrea Califano - Nat. Genet. , 2005
"... Cellular phenotypes are determined by the differential activity of networks linking coregulated genes. Available methods for the reverse engineering of such networks from genome-wide expression profiles have been successful only in the analysis of lower eukaryotes with simple genomes. Using a new m ..."
Abstract - Cited by 178 (2 self) - Add to MetaCart
Cellular phenotypes are determined by the differential activity of networks linking coregulated genes. Available methods for the reverse engineering of such networks from genome-wide expression profiles have been successful only in the analysis of lower eukaryotes with simple genomes. Using a new

Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.

by Robert J Vallerand , Michelle S Fbrtier , Frederic Guay - Journal of Personality and Social Psychology, , 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract - Cited by 183 (19 self) - Add to MetaCart
the motivational model with the supportive evidence. A Motivational Model of High School Dropout The motivational model is depicted in Motivation Toward School One motivational approach that has been found useful in education posits that behavior can be intrinsically or extrinsically motivated Much research

Entityauthority: Semantically enriched graph-based authority propagation

by Julia Stoyanovich, Srikanta Bedathur, Klaus Berberich, Gerhard Weikum - In Proceedings of 10th International Workshop on Web and Databases (WebDB 2007 , 2007
"... This paper pursues the recently emerging paradigm of searching for entities that are embedded in Web pages. We utilize informationextraction techniques to identify entity candidates in documents, map them onto entries in a richly structured ontology, and derive a generalized data graph that encompas ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
the mutual reinforcement between authoritative pages and important entities. This resembles the HITS method for Web-graph link analysis and recently proposed ObjectRank methods, but our approach operates on a much richer, typed graph structure with different kinds of nodes and also differs in the underlying

The Query-flow Graph: Model and Applications

by Paolo Boldi, Debora Donato , et al. , 2008
"... Query logs record the queries and the actions of the users of search engines, and as such they contain valuable information about the interests, the preferences, and the behavior of the users, as well as their implicit feedback to search-engine results. Mining the wealth of information available in ..."
Abstract - Cited by 112 (19 self) - Add to MetaCart
is an outcome of query-log mining and, at the same time, a useful tool for it. We propose a methodology that builds such a graph by mining time and textual information as well as aggregating queries from different users. Using this approach we build a real-world queryflow graph from a large-scale query log
Next 10 →
Results 1 - 10 of 2,264
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University