The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building ancestral recombination graphs (ARGs) with the minimum number of recombination events is an essential problem in genomic population studies. Exhaustive search methods have been proposed to solve the problem with few sequences and markers. Recently, we introduced ARG4WG algorithm [1] to build plausible ARGs for whole genomes of thousand samples. However, the ARG4WG algorithm was not designed...
Understanding epigenetic changes across various conditions is a fundamental problem to epigenome annotation. With more high-throughput epigenomic data available, computational methods have been developed to quantify various types of epigenetic modification signals, to compare epigenetic marks between different conditions and to understand the functional consequences of epigenetic changes. However,...
Networks naturally capture a host of real-world interactions, from social interactions and email communication to brain activity. However, graphs are not always directly observed, especially in scientific domains, such as neuroscience, where monitored brain activity is often captured as time series. How can we efficiently infer networks from time series data (e.g., model the functional organization...
Given a stream of heterogeneous edges, comprising different types of nodes and edges, which arrive in an interleaved fashion to multiple different graphs evolving simultaneously, how can we spot the anomalous graphs in real-time using only constant memory? This problem is motivated by and generalizes from its application in security to host-level advanced persistent threat (APT) detection. In this...
In multi-proxy multi-signature schemes, an original group of signers can authorize another group of proxy signers under the agreement of all singers both in the original group and proxy group. The paper proposes a new multi-proxy multi-signature based on elliptic curve cryptography. This new scheme is secure against the insider attack that is a powerful attack on the multi-signature schemes.
Amidation plays an important role in a variety of pathological processes and serious diseases like neural dysfunction and hypertension. However, identification of protein amidation sites through traditional experimental methods is time consuming and expensive. Existing computational methods for predicting amidation sites are based on feature extraction, which may result in incomplete or biased features...
Public entities such as companies and politicians increasingly use online social networks to communicate directly with their constituencies. Often, this public messaging is aimed at aligning the entity with a particular cause or issue, such as the environment or public health. However, as a consumer or voter, it can be difficult to assess an entity’s true commitment to a cause based on public messaging...
Expert finding would be useful for a recommendation system which people want to find experts in a specific area. This paper proposes a model to identify focus research areas of computer science researchers thru their publications. We collect title, abstract and keywords of academic papers published in IEEE Xplore digital library of selected researchers from computer science departments of four universities...
Prioritizing genes according to their association with a disease allows researchers to explore genes in more informed ways. Although some useful algorithms have been developed, they are based on single gene importance, gene interaction networks, or gene modules with little consideration of relative gene importance in the context of modules. In this paper, we propose to prioritize genes considering...
Large numbers of Internet of Things (IoT) devices are increasingly deployed in many aspects of modern life. Given their limited resources and computational power, verifying program integrity in such devices is a challenging issue. In this paper, we design MTRA, a Multiple-Tier Remote Attestation protocol, by exploiting differences in resources and computational power among various types of networked...
Content-Centric Networking (CCN) is a recently proposed Internet paradigm that focuses on scalable, secure and efficient content distribution. The main abstraction is named and addressable content. A consumer requests desired named content by generating a so-called interest, which is then routed by the network towards an in-network cached copy, or the authoritative producer, of that content. Since...
This paper gives a brief overview of the 12th Workshop on Trends in Enterprise Architecture Research (TEAR) held at EDOC 2017. The paper introduces the Workshop research topics and presents the accepted papers.
According to change literature, the multiplicity of levels and structures that exist within an organization makes organizational change a difficult process. Similarly, many challenges face any attempt to foster change in engineering education, due to the various layers that make up the field. Looking at the evolution of engineering education research (EER) as a field and the individual pathways of...
The 2017 International Conference on Engineering Technologies and Computer Science (EnT 2017) was held at the S.I. Vavilov Institute for the History of Science and Technology of the Russian Academy of Sciences (IHST) the leading Russian research institute for the history of Science and technology, on September 28, 2017. It was the fourth international conference EnT. The conference EnT 2017 was devoted...
Due to the fundamental trade-off between quality and timeliness of planning, designers of self-adaptive systems often have to compromise between an approach that is quick to find an adaptation plan and an approach that is slow but finds a quality adaptation plan. To deal with this trade-off, in our previous work, we proposed a hybrid planning approach that combines a deliberative and a reactive planning...
The article describes a number of critical moments in the creation of Soviet computer technology and the outstanding role of Academician Keldysh in solving these problems.
Dragonfly network is widely used in modern high-performance computing systems. On this network, however, interference caused by network sharing can lead to significant network congestion and degraded performance. In this work, we present a comparative analysis of intra-application interference on applications with nearest neighbor communication, considering various placement strategies. Our results...
Image co-segmentation is the problem of extracting the common objects from multiple images. Foreground segmentation is always effected by the diverse objects and complex background. However, the existing methods didn't pay much attention to images' background as object, especially the similar background. To address the similar scene co-segmentation problems, a method which considers the foreground...
Using research-based teaching-learning methodologies in Computer Science programs is a challenge. Achieving the balance between the required technical knowledge and scientific rigor in young professionals is difficult in the University. The goal of this paper is to help baccalaureate level teachers and students employ a research-based teaching-learning methodology through the introduction of research...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.