Results 1-20 of 119.
((uid:50002807))

Bookmark and Share    
Full Text
Peer Reviewed
See detailReviving the two-state Markov chain approach
Mizera, Andrzej UL; Pang, Jun UL; Yuan, Qixia UL

in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2018)

Probabilistic Boolean networks (PBNs) is a well-established computational framework for modelling biological systems. The steady-state dynamics of PBNs is of crucial importance in the study of such ... [more ▼]

Probabilistic Boolean networks (PBNs) is a well-established computational framework for modelling biological systems. The steady-state dynamics of PBNs is of crucial importance in the study of such systems. However, for large PBNs, which often arise in systems biology, obtaining the steady-state distribution poses a significant challenge. In this paper, we revive the two-state Markov chain approach to solve this problem. This paper contributes in three aspects. First, we identify a problem of generating biased results with the approach and we propose a few heuristics to avoid such a pitfall. Secondly, we conduct an extensive experimental comparison of the extended two-state Markov chain approach and another approach based on the Skart method. We analyse the results with machine learning techniques and we show that statistically the two-state Markov chain approach has a better performance. Finally, we demonstrate the potential of the extended two-state Markov chain approach on a case study of a large PBN model of apoptosis in hepatocytes. [less ▲]

Detailed reference viewed: 51 (3 UL)
Full Text
Peer Reviewed
See detailOn the Full Control of Boolean Networks
Paul, Soumya UL; Pang, Jun UL; Su, Cui

in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailTowards the Existential Control of Boolean Networks: A Preliminary Report
Paul, Soumya UL; Pang, Jun UL; Su, Cui

in Proceedings of the 4th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (2018)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailL-CMP: an automatic learning-based parameterized verification tool
Cao, Jialun; Li, Yongjian; Pang, Jun UL

in Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (2018)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailLearning probabilistic models for model checking: an evolutionary approach and an empirical study
Wang, Jingyi; Sun, Jun; Yuan, Qixia et al

in International Journal on Software Tools for Technology Transfer (2018), 20(6), 689-704

Detailed reference viewed: 28 (0 UL)
See detailProceedings of the 12th International Symposium on Theoretical Aspects of Software Engineering
Pang, Jun UL; Zhang, Chenyi; He, Jifeng et al

Book published by IEEE Computer Society (2018)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailASSA-PBN: A Toolbox for Probabilistic Boolean Networks
Mizera, Andrzej; Pang, Jun UL; Su, Cui et al

in IEEE/ACM Transactions on Computational Biology and Bioinformatics (2018), 15(4), 1203-1216

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailA Decomposition-based Approach towards the Control of Boolean Networks
Paul, Soumya UL; Su, Cui; Pang, Jun UL et al

in Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics (2018)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailASSA-PBN 3.0: Analysing Context-Sensitive Probabilistic Boolean Networks
Mizera, Andrzej; Pang, Jun UL; Qu, Hongyang et al

in Proceedings of the 16th International Conference on Computational Methods in Systems Biology (2018)

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailTagvisor: A privacy advisor for sharing hashtags
Zhang, Yang; Humbert, Mathias; Rahman, Tahleen et al

in Proceedings of The Web Conference 2018 (WWW'18) (2018)

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailAn Automatic Proving Approach to Parameterized Verification
Li, Yongjian; Duan, Kaiqiang; Jansen, David et al

in ACM Transactions on Computational Logic (2018), 19(4), 1-27

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailDeepCity: A Feature Learning Framework for Mining Location Check-Ins
Pang, Jun UL; Zhang, Yang

in Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (2017)

Detailed reference viewed: 63 (6 UL)
Full Text
Peer Reviewed
See detailQuantifying location sociality
Pang, Jun UL; Zhang, Yang

in Proc. 28th ACM Conference on Hypertext and Social Media - HT'17 (2017)

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailFormal modelling and analysis of receipt-free auction protocols in applied pi
Dong, Naipeng; Jonker, Hugo; Pang, Jun UL

in Computers & Security (2017), 65

Detailed reference viewed: 74 (1 UL)
Full Text
Peer Reviewed
See detailShould We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study
Wang, Jingyi; Sun, Jun; Yuan, Qixia UL et al

in Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (2017)

Detailed reference viewed: 56 (10 UL)
Full Text
Peer Reviewed
See detailDoes #like4like indeed provoke more likes?
zhang, Yang; Ni, Minyue; Han, Weili et al

in Proceedings of the 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI'17) (2017)

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailA new decomposition method for attractor detection in large synchronous Boolean networks
Mizera, Andrzej; Pang, Jun UL; Qu, Hongyang et al

in Proceedings of the 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (2017)

Detailed reference viewed: 57 (4 UL)
Full Text
Peer Reviewed
See detailwalk2friends: Inferring Social Links from Mobility Profiles
Backes, Michael; Humbert, Mathias; Pang, Jun UL et al

in Proceedings of the 24th ACM International Conference on Computer and Communications Security (2017)

Detailed reference viewed: 56 (5 UL)
Full Text
Peer Reviewed
See detailSemantic annotation for places in LBSN through graph embedding
Wang, Yan; Qin, Zongxu; Pang, Jun UL et al

in Proceedings of the 26th ACM International Conference on Information and Knowledge Management - CIKM'17 (2017)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailA verification framework for stateful security protocols
Li, Li; Dong, Naipeng; Pang, Jun UL et al

in Proceedings of the 19th International Conference on Formal Engineering Methods (2017)

Detailed reference viewed: 52 (0 UL)