Results 21 to 30 of about 1,879,885 (315)

Bioinformatics Databases: State of the Art and Research Perspectives [PDF]

open access: yes, 2003
Bioinformatics or computational biology, i.e. the application of mathematical and computer science methods to solving problems in molecular biology that require large scale data, computation, and analysis, is a research area currently receiving a ...
Bry, François, Kröger, Peer
core   +2 more sources

Computer-Aided Diagnosis of Coal Workers’ Pneumoconiosis in Chest X-ray Radiographs Using Machine Learning: A Systematic Literature Review

open access: yesInternational Journal of Environmental Research and Public Health, 2022
Computer-aided diagnostic (CAD) systems can assist radiologists in detecting coal workers’ pneumoconiosis (CWP) in their chest X-rays. Early diagnosis of the CWP can significantly improve workers’ survival rate.
Liton Devnath   +6 more
semanticscholar   +1 more source

Identifying Candidate Risk Factors for Prescription Drug Side Effects using Causal Contrast Set Mining [PDF]

open access: yes, 2015
Big longitudinal observational databases present the opportunity to extract new knowledge in a cost effective manner. Unfortunately, the ability of these databases to be used for causal inference is limited due to the passive way in which the data are ...
Aickelin, Uwe   +3 more
core   +3 more sources

A Polynomial Translation of pi-calculus FCPs to Safe Petri Nets [PDF]

open access: yesLogical Methods in Computer Science, Volume 9, Issue 3 (September 17, 2013) lmcs:932, 2013
We develop a polynomial translation from finite control pi-calculus processes to safe low-level Petri nets. To our knowledge, this is the first such translation. It is natural in that there is a close correspondence between the control flows, enjoys a bisimulation result, and is suitable for practical model checking.
arxiv   +1 more source

Women are underrepresented in computational biology: An analysis of the scholarly literature in biology, computer science and computational biology

open access: yesPLoS Comput. Biol., 2017
While women are generally underrepresented in STEM fields, there are noticeable differences between fields. For instance, the gender ratio in biology is more balanced than in computer science. We were interested in how this difference is reflected in the
K. Bonham, Melanie I. Stefan
semanticscholar   +1 more source

Preparing Undergraduate Students Majoring in Computer Science and Mathematics with Data Science Perspectives and Awareness in the Age of Big Data [PDF]

open access: yes, 2015
Undergraduate students majoring in Computer Science and Mathematics are entering the workforce not only as programmers and mathematicians but also as data and business intelligent analysts.
Bussaban, Kanyarat, Waraporn, Phanu
core   +1 more source

Analyzing the Use of Concept Maps in Computer Science: A Systematic Mapping Study

open access: yesInformatics Educ., 2017
. Context: concept Maps (CMs) enable the creation of a schematic representation of a domain knowledge. For this reason, CMs have been applied in different research areas, including Computer Science.
Vinicius dos Santos   +3 more
semanticscholar   +1 more source

The Deluge of Spurious Correlations in Big Data [PDF]

open access: yes, 2015
International audienceVery large databases are a ma jor opp ortunity for science and data analytics is a remarkable new field of investigation in computer science.
Calude, Cristian,, Longo, Giuseppe
core   +3 more sources

Why The Trans Programmer? [PDF]

open access: yesarXiv, 2022
Through online anecdotal evidence and online communities, there is an in-group idea of trans people (specifically trans-feminine individuals) disproportionately entering computer science education & fields. Existing data suggests this is a plausible trend, yet no research has been done into exactly why.
arxiv  

Decidability of higher-order matching [PDF]

open access: yesLogical Methods in Computer Science, Volume 5, Issue 3 (July 30, 2009) lmcs:757, 2009
We show that the higher-order matching problem is decidable using a game-theoretic argument.
arxiv   +1 more source

Home - About - Disclaimer - Privacy