Search alternatives:
selection algorithm » detection algorithms (Expand Search), prediction algorithms (Expand Search)
code selection » node selection (Expand Search), model selection (Expand Search), wide selection (Expand Search)
code detection » score detection (Expand Search), case detection (Expand Search), wide detection (Expand Search)
selection algorithm » detection algorithms (Expand Search), prediction algorithms (Expand Search)
code selection » node selection (Expand Search), model selection (Expand Search), wide selection (Expand Search)
code detection » score detection (Expand Search), case detection (Expand Search), wide detection (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
Evolutionary analysis of the <i>Strumpellin</i> coding sequences by Maximum Likelihood method.
Published 2024“…Initial tree(s) for the heuristic search were obtained automatically by applying Neighbor-Join and BioNJ algorithms to a matrix of pairwise distances estimated using the Tamura 3 parameter model, and then selecting the topology with superior log likelihood value. …”
-
10
-
11
-
12
Overview of archaic SNPs (aSNPs) potentially affecting G4 formation, identified by G4SNVHunter.
Published 2025Subjects: -
13
-
14
-
15
-
16
-
17
MD5 signatures from specific regions from a set of files
Published 2025Subjects: “…Data structures and algorithms…”
-
18
-
19
-
20
Code snippet from “Netty/Buffer” Maven artefact.
Published 2025“…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”