Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Mechanism of DNA unwinding by MCM8-9 in complex with HROB

    HROB promotes the MCM8-9 helicase in DNA damage response. To understand how HROB activates MCM8-9, we defined their interaction interface. We showed that HROB makes important yet transient contacts with both M...

    Ananya Acharya, Hélène Bret, Jen-Wei Huang, Martin Mütze in Nature Communications (2024)

  2. No Access

    Chapter and Conference Paper

    GraphSAGE-Based Spammer Detection Using Social Attribute Relationship

    Spammers have existed since the birth of the Internet. They constantly pollute the social network environment, seriously degrade user experience and pose a threat to user account security. Finding spammers has...

    Bing-Yun **, Shiou-Chi Li, Jen-Wei Huang in Technologies and Applications of Artificia… (2024)

  3. No Access

    Chapter and Conference Paper

    Geometrically-Aware Dual Transformer Encoding Visual and Textual Features for Image Captioning

    When describing pictures from the point of view of human observers, the tendency is to prioritize eye-catching objects, link them to corresponding labels, and then integrate the results with background informa...

    Yu-Ling Chang, Hao-Shang Ma, Shiou-Chi Li in Advances in Knowledge Discovery and Data M… (2024)

  4. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part V

    De-Nian Yang, **ng **e in Lecture Notes in Computer Science (2024)

  5. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part III

    De-Nian Yang, **ng **e in Lecture Notes in Computer Science (2024)

  6. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part IV

    De-Nian Yang, **ng **e in Lecture Notes in Computer Science (2024)

  7. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part VI

    De-Nian Yang, **ng **e in Lecture Notes in Computer Science (2024)

  8. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part I

    De-Nian Yang, **ng **e in Lecture Notes in Computer Science (2024)

  9. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part II

    De-Nian Yang, **ng **e in Lecture Notes in Computer Science (2024)

  10. No Access

    Article

    Mining full, inner and tail periodic patterns with perfect, imperfect and asynchronous periodicity simultaneously

    Periodic pattern has been utilized in many real life applications, such as weather conditions in a particular season, transactions in a superstore, power consumption, computer network fault analysis, and analy...

    Jen-Wei Huang, Bijay Prasad Jaysawal in Data Mining and Knowledge Discovery (2021)

  11. No Access

    Book and Conference Proceedings

    Database Systems for Advanced Applications

    26th International Conference, DASFAA 2021, Taipei, Taiwan, April 11–14, 2021, Proceedings, Part I

    Christian S. Jensen, Ee-Peng Lim in Lecture Notes in Computer Science (2021)

  12. No Access

    Book and Conference Proceedings

    Database Systems for Advanced Applications

    26th International Conference, DASFAA 2021, Taipei, Taiwan, April 11–14, 2021, Proceedings, Part III

    Christian S. Jensen, Ee-Peng Lim in Lecture Notes in Computer Science (2021)

  13. No Access

    Book and Conference Proceedings

    Database Systems for Advanced Applications. DASFAA 2021 International Workshops

    BDQM, GDMA, MLDLDSA, MobiSocial, and MUST, Taipei, Taiwan, April 11–14, 2021, Proceedings

    Christian S. Jensen, Ee-Peng Lim in Lecture Notes in Computer Science (2021)

  14. Chapter and Conference Paper

    Correction to: Database Systems for Advanced Applications

    The original version of the book was inadvertently published with incorrect acknowledgements in chapters 28 and 31. The acknowledgements have been corrected and read as follows: Acknowledgement: “This paper is...

    Christian S. Jensen, Ee-Peng Lim in Database Systems for Advanced Applications (2021)

  15. No Access

    Chapter and Conference Paper

    User Preference Translation Model for Next Top-k Items Recommendation with Social Relations

    Recommendation systems are used to predict the interests of users through the analysis of historical preferences. Collaborative filtering-based approaches usually ignore the sequential information and sequenti...

    Hao-Shang Ma, Jen-Wei Huang in Database Systems for Advanced Applications (2021)

  16. No Access

    Book and Conference Proceedings

    Database Systems for Advanced Applications

    26th International Conference, DASFAA 2021, Taipei, Taiwan, April 11–14, 2021, Proceedings, Part II

    Christian S. Jensen, Ee-Peng Lim in Lecture Notes in Computer Science (2021)

  17. Article

    Open Access

    MCM8IP activates the MCM8-9 helicase to promote DNA synthesis and homologous recombination upon DNA damage

    Homologous recombination (HR) mediates the error-free repair of DNA double-strand breaks to maintain genomic stability. Here we characterize C17orf53/MCM8IP, an OB-fold containing protein that binds ssDNA, as ...

    Jen-Wei Huang, Ananya Acharya, Angelo Taglialatela in Nature Communications (2020)

  18. No Access

    Chapter and Conference Paper

    Social Influence Prediction by a Community-Based Convolutional Neural Network

    This is an extension from a selected paper from JSAI2019. Learning social influence between users on social networks has beextensively studied in a decade. Many models were proposed to model the microscopic di...

    Shao Hsuan Tai, Hao-Shang Ma, Jen-Wei Huang in Advances in Artificial Intelligence (2020)

  19. No Access

    Article

    Mining frequent and top-K High Utility Time Interval-based Events with Duration patterns

    Traditional frequent sequential pattern mining only considers the time point-based item or event in the patterns. However, in many application, the events may span over multiple time points and the relations a...

    Jen-Wei Huang, Bijay Prasad Jaysawal, Kuan-Ying Chen in Knowledge and Information Systems (2019)

  20. No Access

    Article

    Unknown but interesting recommendation using social penetration

    With the recent rise in popularity of social networks, millions of users have included social network Web sites into their daily lives. Traditional social recommendation systems suggest items with high popular...

    Jen-Wei Huang, Hao-Shang Ma, Chih-Chin Chung, Zhi-Jia Jian in Soft Computing (2019)

previous disabled Page of 2