• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,200
Next 10 →

RESEARCH Open Access On the design of clone-based haplotyping

by Christine Lo, Rui Liu, Jehyuk Lee, Kimberly Robasky, Susan Byrne, Carolina Lucchesi, John Aach, George Church, Vineet Bafna, Kun Zhang
"... Background: Haplotypes are important for assessing genealogy and disease susceptibility of individual genomes, but are difficult to obtain with routine sequencing approaches. Experimental haplotype reconstruction based on assembling fragments of individual chromosomes is promising, but with variable ..."
Abstract - Add to MetaCart
as haplotypes of existing clone-based strategies, whether in vivo or in vitro. Conclusions: Our results provide practical guidelines for the development and design of clone-based methods to

Cloning-based context-sensitive pointer alias analysis using binary decision diagrams

by John Whaley, Monica S. Lam - In Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation , 2004
"... This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a method for every context of interest, and run a context-insensitive algorithm over the expanded call graph to get context-s ..."
Abstract - Cited by 311 (16 self) - Add to MetaCart
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a method for every context of interest, and run a context-insensitive algorithm over the expanded call graph to get context

A Comparison of Parallel Pyrosequencing and Sanger Clone-Based Sequencing and Its Impact on the Characterization of the Genetic Diversity of HIV-1

by Binhua Liang, Ma Luo, Joel Scott-herridge, Christina Semeniuk, Mark Mendoza, Rupert Capina, Brent Sheardown, Hezhao Ji, Joshua Kimani, Blake T. Ball, Gary Van Domselaar, Shane Tyler, Steven J. M. Jones, Francis A. Plummer
"... Background: Pyrosequencing technology has the potential to rapidly sequence HIV-1 viral quasispecies without requiring the traditional approach of cloning. In this study, we investigated the utility of ultra-deep pyrosequencing to characterize genetic diversity of the HIV-1 gag quasispecies and asse ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
,034 variations were identified by 454 pyrosequencing versus 3,632 variations by Sanger clone-based (SCB) sequencing. 11,050 of these variations were detected only by pyrosequencing. These undetected variations were located in the HIV-1 Gag region which is known to contain putative cytotoxic T lymphocyte (CTL

Characterization of microbial diversity by determining terminal restriction length polymorphisms of genes encoding 16S rDNA.

by Wen-Tso Liu , Terence L Marsh , Hans Cheng , Larry J Forney - Appl. Environ. Microbiol. , 1997
"... A quantitative molecular technique was developed for rapid analysis of microbial community diversity in various environments. The technique employed PCR in which one of the two primers used was fluorescently labeled at the 5 end and was used to amplify a selected region of bacterial genes encoding ..."
Abstract - Cited by 263 (7 self) - Add to MetaCart
of the library based on sequence differences (4) or by determining restriction fragment length polymorphisms (RFLPs) of the rDNAs (19). The richness and evenness of a community are qualitatively estimated based on the number of unique clones and the relative frequencies of the various "

Adaptive Fraud Detection

by Tom Fawcett, Foster Provost - DATA MINING AND KNOWLEDGE DISCOVERY , 1997
"... One method for detecting fraud is to check for suspicious changes in user behavior. This paper describes the automatic design of user profiling methods for the purpose of fraud detection, using a series of data mining techniques. Specifically, we use a rule-learning program to uncover indicators of ..."
Abstract - Cited by 221 (19 self) - Add to MetaCart
high-confidence alarms. The system has been applied to the problem of detecting cellular cloning fraud based on a database of call records. Experiments indicate that this automatic approach performs better than hand-crafted methods for detecting fraud. Furthermore, this approach can adapt

A highly efficient recombineering-based method for generating conditional knockout mutations.

by Pentao Liu , Nancy A Jenkins , Neal G Copeland - Genome Res. , 2003
"... Phage-based Escherichia coli homologous recombination systems have recently been developed that now make it possible to subclone or modify DNA cloned into plasmids, BACs, or PACs without the need for restriction enzymes or DNA ligases. This new form of chromosome engineering, termed recombineering, ..."
Abstract - Cited by 185 (14 self) - Add to MetaCart
Phage-based Escherichia coli homologous recombination systems have recently been developed that now make it possible to subclone or modify DNA cloned into plasmids, BACs, or PACs without the need for restriction enzymes or DNA ligases. This new form of chromosome engineering, termed recombineering

An Efficient Implementation of Self, a Dynamically-Typed Object-Oriented Language Based on Prototypes

by Craig Chambers, David Ungar, Elgin Lee , 1991
"... We have developed and implemented techniques that double the performance of dynamically-typed object-oriented languages. Our SELF implementation runs twice as fast as the fastest Smalltalk implementation, despite SELF's lack of classes and explicit variables. To compensate for the absence of cl ..."
Abstract - Cited by 180 (27 self) - Add to MetaCart
of classes, our system uses implementation-level maps to transparently group objects cloned from the same prototype, providing data type information and eliminating the apparent space overhead for prototype-based systems. To compensate for dynamic typing, user-defined control structures, and the lack

Example-Based Motion Cloning

by unknown authors , 2004
"... In this paper, we pose a motion cloning problem of retargeting the motion of a source character to a target character with a different structure. Based on scattered data interpolation, an example-based approach to motion cloning is proposed. Provided with a set of example motions, our method automat ..."
Abstract - Add to MetaCart
In this paper, we pose a motion cloning problem of retargeting the motion of a source character to a target character with a different structure. Based on scattered data interpolation, an example-based approach to motion cloning is proposed. Provided with a set of example motions, our method

Refactoring Support Based on Code Clone Analysis

by Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue - Kansai Science City , 2004
"... Software maintenance is the most expensive activity in software development. Many software companies spent a large amount of cost to maintain the existing software systems. In perfective maintenance, refactoring has often been applied to the software to improve the understandability and complexi ..."
Abstract - Cited by 28 (1 self) - Add to MetaCart
. Code clones are one of the factors that make software maintenance di#cult. In this paper, we propose a method which removes code clones from object oriented software by using existing refactoring patterns, especially "Extract Method" and "Pull Up Method". Then, we have

Optimizing dynamically-typed object-oriented languages with polymorphic inline caches

by Craig Chambers, David Ungar, Elgin Lee , 1991
"... Abstract. We have developed and implemented techniques that double the performance of dynamically-typed object-oriented languages. Our SELF implementation runs twice as fast as the fastest Smalltalk implementation, despite SELF’s lack of classes and explicit variables. To compensate for the absence ..."
Abstract - Cited by 130 (10 self) - Add to MetaCart
of classes, our system uses implementation-level maps to transparently group objects cloned from the same prototype, providing data type information and eliminating the apparent space overhead for prototype-based systems. To compensate for dynamic typing, user-defined control structures, and the lack
Next 10 →
Results 1 - 10 of 1,200
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University