![]() ![]() Danilava, Sviatlana ![]() ![]() ![]() in CHIST-ERA Conference, Edinburgh, Scotland. (2012) Detailed reference viewed: 118 (13 UL)![]() del Sol Mesa, Antonio ![]() in Molecular Systems Biology (2012) Detailed reference viewed: 77 (2 UL)![]() ![]() Lehnert, Thorsten ![]() Scientific Conference (2012) Detailed reference viewed: 34 (1 UL)![]() Glesener, Jeanne ![]() in Colas-Blaise, Marion; Tore, Gian-Maria (Eds.) Médias et médiations culturelles au Luxembourg (2012) Detailed reference viewed: 107 (8 UL)![]() Greiff, Samuel ![]() Book published by Waxmann (2012) Detailed reference viewed: 183 (6 UL)![]() ; ; et al in BioData Mining (2012), 5(1), Background: Keeping up-to-date with bioscience literature is becoming increasingly challenging. Several recent methods help meet this challenge by allowing literature search to be launched based on lists ... [more ▼] Background: Keeping up-to-date with bioscience literature is becoming increasingly challenging. Several recent methods help meet this challenge by allowing literature search to be launched based on lists of abstracts that the user judges to be ‘interesting’. Some methods go further by allowing the user to provide a second input set of ‘uninteresting’ abstracts; these two input sets are then used to search and rank literature by relevance. In this work we present the service ‘Caipirini’ (http:// caipirini.org) that also allows two input sets, but takes the novel approach of allowing ranking of literature based on one or more sets of genes. Results: To evaluate the usefulness of Caipirini, we used two test cases, one related to the human cell cycle, and a second related to disease defense mechanisms in Arabidopsis thaliana. In both cases, the new method achieved high precision in finding literature related to the biological mechanisms underlying the input data sets. Conclusions: To our knowledge Caipirini is the first service enabling literature search directly based on biological relevance to gene sets; thus, Caipirini gives the research community a new way to unlock hidden knowledge from gene sets derived via high-throughput experiments. [less ▲] Detailed reference viewed: 123 (2 UL)![]() Schilling, Tanja ![]() Presentation (2012) Detailed reference viewed: 60 (0 UL)![]() Glaab, Enrico ![]() ![]() in Bioinformatics (2012) Finding significant differences between the expression levels of genes or proteins across diverse biological conditions is one of the primary goals in the analysis of functional genomics data. However ... [more ▼] Finding significant differences between the expression levels of genes or proteins across diverse biological conditions is one of the primary goals in the analysis of functional genomics data. However, existing methods for identifying differentially expressed genes or sets of genes by comparing measures of the average expression across predefined sample groups do not detect differential variance in the expression levels across genes in cellular pathways. Since corresponding pathway deregulations occur frequently in microarray gene or protein expression data, we present a new dedicated web application, PathVar, to analyze these data sources. The software ranks pathway-representing gene/protein sets in terms of the differences of the variance in the within-pathway expression levels across different biological conditions. Apart from identifying new pathway deregulation patterns, the tool exploits these patterns by combining different machine learning methods to find clusters of similar samples and build sample classification models. [less ▲] Detailed reference viewed: 170 (11 UL)![]() Klein, Jacques ![]() in On the Formalisation of GeKo: a Generic Aspect Models Weaver (Tech Report) (2012) This technical report presents the formalisation of the composition operator of GeKo, a Generic Aspect Models Weaver Detailed reference viewed: 97 (1 UL)![]() Müller, Jonas ![]() Bachelor/master dissertation (2012) Detailed reference viewed: 96 (1 UL)![]() Carr, Constance ![]() Report (2012) Detailed reference viewed: 111 (6 UL)![]() ; ; Glock, Sabine ![]() in Cyberpsychology, Behavior, and Social Networking (2012), 15 Abstract Censorship of violent digital games, especially first-person shooter (FPS) games, is broadly discussed between generations. While older people are concerned about possible negative influences of ... [more ▼] Abstract Censorship of violent digital games, especially first-person shooter (FPS) games, is broadly discussed between generations. While older people are concerned about possible negative influences of these games, not only players but also nonplayers of the younger net-generation seem to deny any association with real aggressive behavior. Our study aimed at investigating defense mechanisms players and nonplayers use to defend FPS and peers with playing habits. By using a lexical decision task, we found that aggressive concepts are activated by priming the content of FPS but suppressed afterward. Only if participants were instructed to actively suppress aggressive concepts after priming, thought suppression was no longer necessary. Young people still do have negative associations with violent video games. These associations are neglected by implicitly applying defense strategies—independent of own playing habits—to protect this specific hobby, which is common for the netgeneration. [less ▲] Detailed reference viewed: 96 (2 UL)![]() Gericke, Kilian ![]() ![]() in Proceedings of the 12th International Design Conference - DESIGN 2012 (2012) This paper presents a comparison of design methodologies and process models from nine disciplines. The evolutionary development of the approaches, which can be traced back to similar roots, lead to ... [more ▼] This paper presents a comparison of design methodologies and process models from nine disciplines. The evolutionary development of the approaches, which can be traced back to similar roots, lead to process models which are now adapted to specific design disciplines but still have many similarities. Most of the established approaches have not been adapted to many of the challenges of current design practice and represent isolated views on the design process. This comparison is intended to provide a basis for consolidation and reformation of design methodology. [less ▲] Detailed reference viewed: 156 (3 UL)![]() ![]() Radu, Marc ![]() ![]() Poster (2012) Detailed reference viewed: 44 (2 UL)![]() Poray, Jayanta ![]() ![]() in Proceedings "4th International Conference on Agents and Artificial Intelligence" (2012) Detailed reference viewed: 131 (7 UL)![]() Adedjouma, Morayo ![]() in 12th International Conference, SPICE 2012, Palma, Spain, May 29-31, 2012. Proceedings (2012) Detailed reference viewed: 102 (2 UL)![]() Fleming, Ronan MT ![]() in Journal of Theoretical Biology (2012), 292 We derive a convex optimization problem on a steady-state no nequilibrium network of biochemical reactions, with the property that energy conservation and the second law of thermodynamics both hold at the ... [more ▼] We derive a convex optimization problem on a steady-state no nequilibrium network of biochemical reactions, with the property that energy conservation and the second law of thermodynamics both hold at the problem solution. This suggests a new variational principle for biochemical networks that can be implemented in a computationally tractable manner. We derive the Lagrange dual of the optimization problem and use strong duality to demonstrate that a biochemical analogue of Tellegen’s theorem holds at optimality. Each optimal flux is dependent on a free parameter that we relate to an elementary kinetic parameter when mass action kinetics is assumed. [less ▲] Detailed reference viewed: 151 (10 UL)![]() ![]() Biesta, Gert ![]() in Vansieleghem, N.; Kennedy, D. (Eds.) Philosophy for children in transition: Problems and prospects. (2012) Detailed reference viewed: 122 (0 UL)![]() Glock, Sabine ![]() ![]() in Addictive Behaviors (2012), 37 Smokers often have (implicit or explicit) positive smoking outcome expectancies that motivate them to smoke. For instance, they may feel that smoking is relaxing, that it improves concentration, or that ... [more ▼] Smokers often have (implicit or explicit) positive smoking outcome expectancies that motivate them to smoke. For instance, they may feel that smoking is relaxing, that it improves concentration, or that it is seen as cool and attractive by peers. These expectations are, for the most part, illusory. In order to counteract these expectations, we designed cigarette package warning labels that contradicted common positive outcome expectancies. We investigated the effectiveness of our new warning labels in two experiments. We first measured smokers' implicit attitudes toward smoking using an affective priming method and found that our new warning labels changed positive attitudes into ambivalent attitudes. We then tested whether our warning labels changed smokers' self-reported positive outcome expectancies and smoking behavior. Smokers presented with the new warning labels immediately associated positive outcome expectancies less strongly with smoking and reported smoking fewer cigarettes in the 24 hours following the experiment. Explicitly taking the reasons for unhealthy behavior into account when trying to change people's habits could offer a valuable contribution to effective health campaigns. [less ▲] Detailed reference viewed: 145 (6 UL)![]() Machalek, Aurel ![]() in Technical Sciences (2012) This document describes the possibilities for Internet Protocol communications in crisis situations. Its main goal is to show IPv4 and IPv6 solutions developed during the lifetime of the SECRICOM project ... [more ▼] This document describes the possibilities for Internet Protocol communications in crisis situations. Its main goal is to show IPv4 and IPv6 solutions developed during the lifetime of the SECRICOM project. Communications technologies in current use are showing their limitations. Whether reacting to a small incident or a great catastrophe, first responders increasingly need to share information such as video, images or other data. Society’s evolving expectations concerning safety can be compared with the development of Internet protocols. We examine IP-based communication for crisis management, and show that it is ready to bind together currently fragmented technologies such as TETRA and analogue radios, providing a new dimension of interoperability, including cross-border communication. [less ▲] Detailed reference viewed: 109 (11 UL) |
||