Fettke. Clustering traces using sequence alignment. In Proceedings of the 11th International Workshop on Business Process Intelligence,. International Workshop on Business Process Intelligence (BPI-15), located
In line with feature-vector based trace clustering techniques, the work of Greco et al. [3] was one of the first approaches that incorporated trace clustering into process discovery algorithms. Their work uses frequent (sub)sequences of activities to constitute feature vectors that represent traces...
In contrast to the Otago domain, the Southern South Island domain has only scattered and discontinuous active reverse fault traces (Blue Mountain, Tin Hut, Mossburn, Acton, White Hill, and Hauroko faults; Turnbull and Allibone Citation2003; Pace et al. Citation2005; Turnbull et al. Citation...
The pipeline then proceeds with an ungapped alignment algorithm that rescores the structures on the basis of the shared diagonal between members and representatives using 3Di and amino acid information. The sequences that meet the defined alignment criteria, such asE-value, alignment coverage, sequenc...
Correction: Inferring Passenger Denial Behavior of Taxi Drivers from Large-Scale Taxi Traces. PLoS ONE 2017, 12, e0171876. [CrossRef] [PubMed] 2. Liu, X.; Ban, Y. Uncovering Spatio-Temporal Cluster Patterns Using Massive Floating Car Data. ISPRS Int. J. Geo-Inf. 2013, 2, 371–384. ...
(110/002:d = 0.314 nm) traces a final full conversion within 850 s. A transition to 6H-PbI2(R-3m) was similarly observed by Chen et al.28on single-crystal MAPbI3samples. The authors describe this phase change as occurring through an intermediate transition characterised by I ...
Modeling of KcsA in the open conformation was done by homology, using the crystal structure of the open calcium-gated potassium channel MthK as a template (33) (Protein Data Bank code 1LNQ). The sequence alignment was made with CLUSTALW (34) at the European Bioinformatics Institute site and...
Discoverer: automatic protocol reverse engineering from network traces. In: Proc. 16th USENIX Secur. Symp., Boston, MA, USA, Aug. 2007, pp. 199–212. 14. Bossert G Exploiting semantic for the automatic reverse engineering of communication protocols. Ph.D. dissertation, Univ. Gif-sur- Yvette...
GFP was excited with a 490 nm, 40 mHz pulsed laser using 10 μW in the back focal plane. Photon traces were recorded for 20 s with 600 ns resolution directly using the Abberior FPGA and correlated using a multiple-tau correlator in MATLAB. The correlation data were fitted assuming 3D ...
Another study analysed the similarity of linear receptive fields of simple cells in layers 2/3 and emphasized the large diversity of the local population26. Nonetheless, as pointed out by the authors, their data showed traces of spatial clustering, with cells within 100 μm of each other hav...