• Publications
  • Influence
Network component analysis: Reconstruction of regulatory signals in biological systems
TLDR
This work develops a method, called network component analysis, for uncovering hidden regulatory signals from outputs of networked systems, when only a partial knowledge of the underlying network topology is available.
A New Proof for the Existence of Mutually Unbiased Bases
TLDR
A constructive proof of the existence of mutually biased bases for dimensions that are powers of primes is presented and it is proved that in any dimension d the number of mutually unbiased bases is at most d+1.
Task Matching and Scheduling in Heterogenous Computing Environments Using a Genetic-Algorithm-Based Approach
TLDR
Simulation results for larger-sized problems showed that this genetic-algorithm-based approach outperformed two nonevolutionary heuristics and a random search.
Independent component analysis based on nonparametric density estimation
TLDR
A novel independent component analysis algorithm, which is truly blind to the particular underlying distribution of the mixed signals, is introduced, which consistently outperformed all state-of-the-art ICA methods and demonstrated the following properties.
Optimal encryption of quantum bits
TLDR
It is shown that $2n$ random classical bits are both necessary and sufficient for encrypting any unknown state of n quantum bits in an informationally secure manner and a connection is made between quantum encryption and quantum teleportation that allows for a different proof of optimality of teleportation.
Transcriptome-based determination of multiple transcription regulator activities in Escherichia coli by using network component analysis.
TLDR
The utility of network component analysis in determining multiple transcription factor activities based on transcriptome profiles and available connectivity information regarding network connectivity is demonstrated.
Leveraging social networks to fight spam
TLDR
An automated antispam tool exploits the properties of social networks to distinguish between unsolicited commercial e-mail - spam - and messages associated with people the user knows.
Covariance selection for nonchordal graphs via chordal embedding
TLDR
Algorithms for maximum likelihood estimation of Gaussian graphical models with conditional independence constraints and efficient implementations of Newton's method and the conjugate gradient method are described, by embedding the graph in a chordal graph.
Discrete Neural Computation: A Theoretical Foundation
TLDR
1. Computing Symmetric Functions 2. Depth Efficient Arithmetic Circuits 3. Rational Approximation and Optimal Size Circuits.
Scale-free and stable structures in complex ad hoc networks.
TLDR
The dynamics reported in this paper can be used to craft protocols for designing highly dynamic peer-to-peer networks and also to account for the power-law exponents observed in existing popular services.
...
1
2
3
4
5
...