• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,499,359
Next 10 →

multiple authors

by Small Wars Manual, Major Adam, T Strickl - Professional II/PLUS and NeuralWorks Explorer. NeuralWare, Inc , 1995
"... 1 REPORT DOCUMENTATION PAGE ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
1 REPORT DOCUMENTATION PAGE

Formal and real authority in organizations

by Jean Tirole - The Journal of Political Economy , 1997
"... This paper develops a theory of the allocation of formal authority (the right to decide) and real authority (the effective control over decisions) within organizations, and it illustrates how a formally integrated structure can accommodate various degrees of "real" integration. Real author ..."
Abstract - Cited by 845 (22 self) - Add to MetaCart
of formal authority within organizations, the paper examines a number of factors that increase the subordinates ' real authority in a formally integrated structure: overload, lenient rules, urgency of decision, reputation, performance measurement, and multiplicity of superiors. Finally, the amount

2005 MAFFT version 5: improvement in accuracy of multiple sequence alignment. Nucleic Acids Res

by Kazutaka Katoh, Kei-ichi Kuma, Hiroyuki Toh, Takashi Miyata
"... The accuracy of multiple sequence alignment pro-gram MAFFT has been improved. The new version (5.3) of MAFFT offers new iterative refinement opti-ons, H-INS-i, F-INS-i and G-INS-i, in which pairwise alignment information are incorporated into objective function. These new options of MAFFT showed hig ..."
Abstract - Cited by 788 (5 self) - Add to MetaCart
The accuracy of multiple sequence alignment pro-gram MAFFT has been improved. The new version (5.3) of MAFFT offers new iterative refinement opti-ons, H-INS-i, F-INS-i and G-INS-i, in which pairwise alignment information are incorporated into objective function. These new options of MAFFT showed

Normalization for cDNA microarray data: a robust composite method addressing single and multiple slide systematic variation

by Yee Hwa Yang, Sandrine Dudoit, Percy Luu, Vivian Peng , 2002
"... There are many sources of systematic variation in cDNA microarray experiments which affect the measured gene expression levels (e.g. differences in labeling efficiency between the two fluorescent dyes). The term normalization refers to the process of removing such variation. A constant adjustment is ..."
Abstract - Cited by 699 (9 self) - Add to MetaCart
There are many sources of systematic variation in cDNA microarray experiments which affect the measured gene expression levels (e.g. differences in labeling efficiency between the two fluorescent dyes). The term normalization refers to the process of removing such variation. A constant adjustment is often used to force the distribution of the intensity log ratios to have a median of zero for each slide. However, such global normalization approaches are not adequate in situations where dye biases can depend on spot overall intensity and/or spatial location within the array. This article proposes normalization methods that are based on robust local regression and account for intensity and spatial dependence in dye biases for different types of cDNA microarray experiments. The selection of appropriate controls for normalization is discussed and a novel set of controls (microarray sample pool, MSP) is introduced to aid in intensity-dependent normalization. Lastly, to allow for comparisons of expression levels across slides, a robust method based on maximum likelihood estimation is proposed to adjust for scale differences among slides.

The Sybil Attack

by John Douceur, Judith S. Donath , 2002
"... Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby unde ..."
Abstract - Cited by 1518 (1 self) - Add to MetaCart
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby

Limma: linear models for microarray data

by Gordon K. Smyth, Matthew Ritchie, Natalie Thorne, James Wettenhall, Wei Shi - Bioinformatics and Computational Biology Solutions using R and Bioconductor , 2005
"... This free open-source software implements academic research by the authors and co-workers. If you use it, please support the project by citing the appropriate journal articles listed in Section 2.1.Contents ..."
Abstract - Cited by 759 (13 self) - Add to MetaCart
This free open-source software implements academic research by the authors and co-workers. If you use it, please support the project by citing the appropriate journal articles listed in Section 2.1.Contents

The Knowledge Level

by Allen Newell, Allen Newell - In International Conference on Software Engineering , 1982
"... The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying of this document without permission of its author may be prohibited by law. ..."
Abstract - Cited by 871 (1 self) - Add to MetaCart
The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying of this document without permission of its author may be prohibited by law.

A Positive Theory of Monetary Policy in a Natural-Rate Model." Working Paper no. 807

by J. Barro, David B. Gordon, Robert J. Barro, David B. Gordon , 1981
"... you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact inform ..."
Abstract - Cited by 1008 (4 self) - Add to MetaCart
you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact

Mental rotation of three-dimensional objects

by N. Shepard, Jacqueline Metzler - Science , 1971
"... you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact inform ..."
Abstract - Cited by 818 (5 self) - Add to MetaCart
you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact

Isolation of a cDNA clone derived from a blood-borne non-A, non-B viral hepatitis genome

by Author(s) Qui-lim Choo, George Kuo, Amy J. Weiner, Lacy R. Overby, Daniel W. Bradley, Michael Houghton , 1989
"... you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact inform ..."
Abstract - Cited by 635 (14 self) - Add to MetaCart
you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact
Next 10 →
Results 1 - 10 of 2,499,359
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University