Learn More
1. Summary. The paper provides two mining algorithms for the discovery of patterns in sequences. In this work the authors proposed the notion of delta closed patterns and significant patterns. In this framework they show how the mining of those patterns is used to remove redundant patterns form the most frequent patterns. The authors develop two efficient(More)
Location-based advertising has gained a lot of attention from advertisers in recent years because of the rapid increase the number of in smart phone users. Adversarial location-based advertising is a novel concept that stretches beyond conventional mobile advertising. Advertisers can promote their own products based on location and also compete for(More)
Discovering sequence patterns with variation can unveil functions of a protein family that are important for drug discovery. Exploring protein families using existing methods such as multiple sequence alignment is computationally expensive, thus pattern search, called motif finding in Bioinformatics, is used. However, at present, combinatorial algorithms(More)
Discovering sequence patterns with variations unveils significant functions of a protein family. Existing combinatorial methods of discovering patterns with variations are computationally expensive, and probabilistic methods require more elaborate probabilistic representation of the amino acid associations. To overcome these shortcomings, this paper(More)
MOTIVATION Evolutionarily conserved amino acids within proteins characterize functional or structural regions. Conversely, less conserved amino acids within these regions are generally areas of evolutionary divergence. A priori knowledge of biological function and species can help interpret the amino acid differences between sequences. However, this(More)
Understanding binding cores is of fundamental importance in deciphering Protein-DNA (TF-TFBS) binding and gene regulation. Limited by expensive experiments, it is promising to discover them with variations directly from sequence data. Although existing computational methods have produced satisfactory results, they are one-to-one mappings with no(More)