Skip to main content

Showing 1–35 of 35 results for author: Ko, K

  1. arXiv:2407.08476  [pdf, other

    cs.CV

    VideoMamba: Spatio-Temporal Selective State Space Model

    Authors: Jinyoung Park, Hee-Seon Kim, Kangwook Ko, Minbeom Kim, Changick Kim

    Abstract: We introduce VideoMamba, a novel adaptation of the pure Mamba architecture, specifically designed for video recognition. Unlike transformers that rely on self-attention mechanisms leading to high computational costs by quadratic complexity, VideoMamba leverages Mamba's linear complexity and selective SSM mechanism for more efficient processing. The proposed Spatio-Temporal Forward and Backward SSM… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: ECCV 2024. code available at http://github.com/jinyjelly/VideoMamba

  2. arXiv:2406.07103  [pdf, other

    eess.AS cs.AI

    MR-RawNet: Speaker verification system with multiple temporal resolutions for variable duration utterances using raw waveforms

    Authors: Seung-bin Kim, Chan-yeong Lim, Jungwoo Heo, Ju-ho Kim, Hyun-seo Shin, Kyo-Won Koo, Ha-Jin Yu

    Abstract: In speaker verification systems, the utilization of short utterances presents a persistent challenge, leading to performance degradation primarily due to insufficient phonetic information to characterize the speakers. To overcome this obstacle, we propose a novel structure, MR-RawNet, designed to enhance the robustness of speaker verification systems against variable duration utterances using raw… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: 5 pages, accepted by Interspeech 2024

  3. arXiv:2406.00069  [pdf, other

    cs.CL cs.LG

    Confidence-Aware Sub-Structure Beam Search (CABS): Mitigating Hallucination in Structured Data Generation with Large Language Models

    Authors: Chengwei Wei, Kee Kiat Koo, Amir Tavanaei, Karim Bouyarmane

    Abstract: Large Language Models (LLMs) have facilitated structured data generation, with applications in domains like tabular data, document databases, product catalogs, etc. However, concerns persist about generation veracity due to incorrect references or hallucinations, necessitating the incorporation of some form of model confidence for mitigation. Existing confidence estimation methods on LLM generatio… ▽ More

    Submitted 30 May, 2024; originally announced June 2024.

  4. arXiv:2401.14635  [pdf, other

    cs.CR cs.SE

    Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors

    Authors: Taylor R Schorlemmer, Kelechi G Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Isghair, Saurabh Baghi, Santiago Torres-Arias, James C Davis

    Abstract: Many software applications incorporate open-source third-party packages distributed by public package registries. Guaranteeing authorship along this supply chain is a challenge. Package maintainers can guarantee package authorship through software signing. However, it is unclear how common this practice is, and whether the resulting signatures are created properly. Prior work has provided raw data… ▽ More

    Submitted 14 April, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: Accepted at IEEE Security & Privacy 2024 (S&P'24)

  5. arXiv:2306.02741  [pdf, other

    cs.CV

    ZIGNeRF: Zero-shot 3D Scene Representation with Invertible Generative Neural Radiance Fields

    Authors: Kanghyeok Ko, Minhyeok Lee

    Abstract: Generative Neural Radiance Fields (NeRFs) have demonstrated remarkable proficiency in synthesizing multi-view images by learning the distribution of a set of unposed images. Despite the aptitude of existing generative NeRFs in generating 3D-consistent high-quality random samples within data distribution, the creation of a 3D representation of a singular input image remains a formidable challenge.… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  6. arXiv:2303.09802  [pdf, other

    cs.SE

    TypeScript's Evolution: An Analysis of Feature Adoption Over Time

    Authors: Joshua D. Scarsbrook, Mark Utting, Ryan K. L. Ko

    Abstract: TypeScript is a quickly evolving superset of JavaScript with active development of new features. Our paper seeks to understand how quickly these features are adopted by the developer community. Existing work in JavaScript shows the adoption of dynamic language features can be a major hindrance to static analysis. As TypeScript evolves the addition of features makes the underlying standard more and… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

  7. arXiv:2212.14214  [pdf, other

    cs.AI cs.LG

    Backward Curriculum Reinforcement Learning

    Authors: KyungMin Ko

    Abstract: Current reinforcement learning algorithms train an agent using forward-generated trajectories, which provide little guidance so that the agent can explore as much as possible. While realizing the value of reinforcement learning results from sufficient exploration, this approach leads to a trade-off in losing sample efficiency, an essential factor impacting algorithm performance. Previous tasks use… ▽ More

    Submitted 4 September, 2023; v1 submitted 29 December, 2022; originally announced December 2022.

    Comments: In the proceedings of the 32nd IEEE International Conference on Robot and Human Interactive Communication (IEEE RO-MAN 2023)

  8. arXiv:2212.06368  [pdf, other

    cs.CV eess.IV

    Single Cell Training on Architecture Search for Image Denoising

    Authors: Bokyeung Lee, Kyungdeuk Ko, Jonghwan Hong, Hanseok Ko

    Abstract: Neural Architecture Search (NAS) for automatically finding the optimal network architecture has shown some success with competitive performances in various computer vision tasks. However, NAS in general requires a tremendous amount of computations. Thus reducing computational cost has emerged as an important issue. Most of the attempts so far has been based on manual approaches, and often the arch… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  9. Discriminatory and orthogonal feature learning for noise robust keyword spotting

    Authors: Donghyeon Kim, Kyungdeuk Ko, David K. Han, Hanseok Ko

    Abstract: Keyword Spotting (KWS) is an essential component in a smart device for alerting the system when a user prompts it with a command. As these devices are typically constrained by computational and energy resources, the KWS model should be designed with a small footprint. In our previous work, we developed lightweight dynamic filters which extract a robust feature map within a noisy environment. The l… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: Published in SPL

  10. arXiv:2210.08461  [pdf, other

    cs.LG stat.ML

    Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization

    Authors: Jonathan Wilton, Abigail M. Y. Koay, Ryan K. L. Ko, Miao Xu, Nan Ye

    Abstract: The need to learn from positive and unlabeled data, or PU learning, arises in many applications and has attracted increasing interest. While random forests are known to perform well on many tasks with positive and negative data, recent PU algorithms are generally based on deep neural networks, and the potential of tree-based PU learning is under-explored. In this paper, we propose new random fores… ▽ More

    Submitted 16 October, 2022; originally announced October 2022.

    Comments: Accepted at NeurIPS 2022

  11. arXiv:2206.06862  [pdf, other

    q-bio.QM cs.CV cs.LG eess.IV

    Evaluating histopathology transfer learning with ChampKit

    Authors: Jakub R. Kaczmarzyk, Tahsin M. Kurc, Shahira Abousamra, Rajarsi Gupta, Joel H. Saltz, Peter K. Koo

    Abstract: Histopathology remains the gold standard for diagnosis of various cancers. Recent advances in computer vision, specifically deep learning, have facilitated the analysis of histopathology images for various tasks, including immune cell detection and microsatellite instability classification. The state-of-the-art for each task often employs base architectures that have been pretrained for image clas… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: Submitted to NeurIPS 2022 Track on Datasets and Benchmarks. Source code available at https://github.com/kaczmarj/champkit

    ACM Class: J.3; I.4.9; D.2.13

  12. arXiv:2204.02181  [pdf, other

    cs.CV

    Vision Transformer Equipped with Neural Resizer on Facial Expression Recognition Task

    Authors: Hyeonbin Hwang, Soyeon Kim, Wei-Jin Park, Jiho Seo, Kyungtae Ko, Hyeon Yeo

    Abstract: When it comes to wild conditions, Facial Expression Recognition is often challenged with low-quality data and imbalanced, ambiguous labels. This field has much benefited from CNN based approaches; however, CNN models have structural limitation to see the facial regions in distant. As a remedy, Transformer has been introduced to vision fields with global receptive field, but requires adjusting inpu… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

    Comments: Accepted to IEEE ICASSP 2022

  13. arXiv:2110.01341  [pdf, other

    cs.CV cs.AI cs.LG

    Context-Aware Unsupervised Clustering for Person Search

    Authors: Byeong-Ju Han, Kuhyeun Ko, Jae-Young Sim

    Abstract: The existing person search methods use the annotated labels of person identities to train deep networks in a supervised manner that requires a huge amount of time and effort for human labeling. In this paper, we first introduce a novel framework of person search that is able to train the network in the absence of the person identity labels, and propose efficient unsupervised clustering methods to… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

  14. IceNet for Interactive Contrast Enhancement

    Authors: Keunsoo Ko, Chang-Su Kim

    Abstract: A CNN-based interactive contrast enhancement algorithm, called IceNet, is proposed in this work, which enables a user to adjust image contrast easily according to his or her preference. Specifically, a user provides a parameter for controlling the global brightness and two types of scribbles to darken or brighten local regions in an image. Then, given these annotations, IceNet estimates a gamma ma… ▽ More

    Submitted 25 December, 2021; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: 11 pages, 9 figures, 3 tables. This paper has been accepted for publication in IEEE Access. Copyright may change without notice

  15. arXiv:2104.13050  [pdf, other

    cs.LG

    Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning

    Authors: Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Ryan K L Ko

    Abstract: Federated learning enables multiple participants to collaboratively train a model without aggregating the training data. Although the training data are kept within each participant and the local gradients can be securely synthesized, recent studies have shown that such privacy protection is insufficient. The global model parameters that have to be shared for optimization are susceptible to leak in… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

  16. arXiv:2103.07012  [pdf, other

    cs.CR cs.SE

    ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence

    Authors: Haoxi Tan, Mahin Chandramohan, Cristina Cifuentes, Guangdong Bai, Ryan K. L. Ko

    Abstract: Malware analysis is still largely a manual task. This slow and inefficient approach does not scale to the exponential rise in the rate of new unique malware generated. Hence, automating the process as much as possible becomes desirable. In this paper, we present ColdPress - an extensible malware analysis platform that automates the end-to-end process of malware threat intelligence gathering inte… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: The code is open source at https://github.com/uqcyber/ColdPress

  17. arXiv:2103.06403  [pdf, other

    cs.AI cs.CV cs.RO

    A Vision Based Deep Reinforcement Learning Algorithm for UAV Obstacle Avoidance

    Authors: Jeremy Roghair, Kyungtae Ko, Amir Ehsan Niaraki Asli, Ali Jannesari

    Abstract: Integration of reinforcement learning with unmanned aerial vehicles (UAVs) to achieve autonomous flight has been an active research area in recent years. An important part focuses on obstacle detection and avoidance for UAVs navigating through an environment. Exploration in an unseen environment can be tackled with Deep Q-Network (DQN). However, value exploration with uniform sampling of actions m… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 12 pages, 6 figures

  18. arXiv:2101.11866  [pdf, other

    cs.CR

    An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems

    Authors: Taejun Choi, Guangdong Bai, Ryan K L Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang

    Abstract: Industrial control systems (ICS) of critical infrastructure are increasingly connected to the Internet for remote site management at scale. However, cyber attacks against ICS - especially at the communication channels between humanmachine interface (HMIs) and programmable logic controllers (PLCs) - are increasing at a rate which outstrips the rate of mitigation. In this paper, we introduce a ven… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

  19. arXiv:2012.04405  [pdf

    cs.CR cs.AI cs.CY cs.SE

    Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security

    Authors: Ryan K L Ko

    Abstract: This paper sets the context for the urgency for cyber autonomy, and the current gaps of the cyber security industry. A novel framework proposing four phases of maturity for full cyber autonomy will be discussed. The paper also reviews new and emerging cyber security automation techniques and tools, and discusses their impact on society, the perceived cyber security skills gap/shortage and national… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: 15 pages, 5 figures, preprint of chapter in edited book "Emerging Technologies and International Security: Machines, the State, and War" edited By Reuben Steff, Joe Burton, Simona R. Soare

    ACM Class: I.2.2; I.2.m; K.4.0; K.4.1

  20. arXiv:2011.06135  [pdf, ps, other

    cs.CC cs.DS

    Hardness of Approximate Nearest Neighbor Search under L-infinity

    Authors: Young Kun Ko, Min Jae Song

    Abstract: We show conditional hardness of Approximate Nearest Neighbor Search (ANN) under the $\ell_\infty$ norm with two simple reductions. Our first reduction shows that hardness of a special case of the Shortest Vector Problem (SVP), which captures many provably hard instances of SVP, implies a lower bound for ANN with polynomial preprocessing time under the same norm. Combined with a recent quantitative… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 16 pages

  21. arXiv:2010.11910  [pdf, other

    cs.SD cs.IR cs.LG eess.AS

    Neural Audio Fingerprint for High-specific Audio Retrieval based on Contrastive Learning

    Authors: Sungkyun Chang, Donmoon Lee, Jeongsoo Park, Hyungui Lim, Kyogu Lee, Karam Ko, Yoonchang Han

    Abstract: Most of existing audio fingerprinting systems have limitations to be used for high-specific audio retrieval at scale. In this work, we generate a low-dimensional representation from a short unit segment of audio, and couple this fingerprint with a fast maximum inner-product search. To this end, we present a contrastive learning framework that derives from the segment-level search objective. Each u… ▽ More

    Submitted 10 February, 2021; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: ICASSP 2021 (accepted)

  22. arXiv:2009.11484  [pdf

    cs.CR cs.AI cs.SE

    Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools

    Authors: Hetong Jiang, Taejun Choi, Ryan K. L. Ko

    Abstract: Cybersecurity tools are increasingly automated with artificial intelligent (AI) capabilities to match the exponential scale of attacks, compensate for the relatively slower rate of training new cybersecurity talents, and improve of the accuracy and performance of both tools and users. However, the safe and appropriate usage of autonomous cyber attack tools - especially at the development stages fo… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

    Comments: 20 pages, 10 figures, to be published in SSCC 2020

    MSC Class: 68M25 ACM Class: D.4.6; D.2.5; K.3

  23. arXiv:2008.07083  [pdf, other

    cs.NI cs.CV cs.LG

    Edge Network-Assisted Real-Time Object Detection Framework for Autonomous Driving

    Authors: Seung Wook Kim, Keunsoo Ko, Haneul Ko, Victor C. M. Leung

    Abstract: Autonomous vehicles (AVs) can achieve the desired results within a short duration by offloading tasks even requiring high computational power (e.g., object detection (OD)) to edge clouds. However, although edge clouds are exploited, real-time OD cannot always be guaranteed due to dynamic channel quality. To mitigate this problem, we propose an edge network-assisted real-time OD framework~(EODF). I… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: This paper will be published in IEEE Network

  24. arXiv:2007.12622  [pdf, other

    cs.CV

    BMBC:Bilateral Motion Estimation with Bilateral Cost Volume for Video Interpolation

    Authors: Junheum Park, Keunsoo Ko, Chul Lee, Chang-Su Kim

    Abstract: Video interpolation increases the temporal resolution of a video sequence by synthesizing intermediate frames between two consecutive frames. We propose a novel deep-learning-based video interpolation algorithm based on bilateral motion estimation. First, we develop the bilateral motion network with the bilateral cost volume to estimate bilateral motions accurately. Then, we approximate bi-directi… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    Comments: Accepted to ECCV 2020

  25. arXiv:2007.06953  [pdf, other

    cs.CR

    PrivColl: Practical Privacy-Preserving Collaborative Machine Learning

    Authors: Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K L Ko

    Abstract: Collaborative learning enables two or more participants, each with their own training dataset, to collaboratively learn a joint model. It is desirable that the collaboration should not cause the disclosure of either the raw datasets of each individual owner or the local model parameters trained on them. This privacy-preservation requirement has been approached through differential privacy mechanis… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: 20 pages, 3 figures, to be published in 25th European Symposium on Research in Computer Security (ESORICS) 2020

  26. arXiv:2007.06167  [pdf, other

    cs.DS cs.IT

    Local Editing in LZ-End Compressed Data

    Authors: Daniel Roodt, Ulrich Speidel, Vimal Kumar, Ryan K. L. Ko

    Abstract: This paper presents an algorithm for the modification of data compressed using LZ-End, a derivate of LZ77, without prior decompression. The performance of the algorithm and the impact of the modifications on the compression ratio is evaluated. Finally, we discuss the importance of this work as a first step towards local editing in Lempel-Ziv compressed data.

    Submitted 12 July, 2020; originally announced July 2020.

    Comments: 12 pages, 1 Figure, 2 Tables

  27. arXiv:2001.01599  [pdf, other

    cs.CV cs.LG eess.IV

    Multi-scale Domain-adversarial Multiple-instance CNN for Cancer Subtype Classification with Unannotated Histopathological Images

    Authors: Noriaki Hashimoto, Daisuke Fukushima, Ryoichi Koga, Yusuke Takagi, Kaho Ko, Kei Kohno, Masato Nakaguro, Shigeo Nakamura, Hidekata Hontani, Ichiro Takeuchi

    Abstract: We propose a new method for cancer subtype classification from histopathological images, which can automatically detect tumor-specific features in a given whole slide image (WSI). The cancer subtype should be classified by referring to a WSI, i.e., a large-sized image (typically 40,000x40,000 pixels) of an entire pathological tissue slide, which consists of cancer and non-cancer portions. One diff… ▽ More

    Submitted 2 April, 2020; v1 submitted 6 January, 2020; originally announced January 2020.

    Comments: Accepted to CVPR2020

    ACM Class: I.2.1; I.5.4

  28. arXiv:1910.13543  [pdf, other

    cs.DS cs.CC

    An Adaptive Step Toward the Multiphase Conjecture

    Authors: Young Kun Ko, Omri Weinstein

    Abstract: In 2010, Pǎtraşcu proposed the following three-phase dynamic problem, as a candidate for proving polynomial lower bounds on the operational time of dynamic data structures: I: Preprocess a collection of sets $\vec{S} = S_1, \ldots , S_k \subseteq [n]$, where $k=\operatorname{poly}(n)$. II: A set $T\subseteq [n]$ is revealed, and the data structure updates its memory. III: An index… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

    Comments: 26 pages, 4 figures

  29. arXiv:1802.03581  [pdf

    cs.SD cs.CV eess.AS

    2-gram-based Phonetic Feature Generation for Convolutional Neural Network in Assessment of Trademark Similarity

    Authors: Kyung Pyo Ko, Kwang Hee Lee, Mi So Jang, Gun Hong Park

    Abstract: A trademark is a mark used to identify various commodities. If same or similar trademark is registered for the same or similar commodity, the purchaser of the goods may be confused. Therefore, in the process of trademark registration examination, the examiner judges whether the trademark is the same or similar to the other applied or registered trademarks. The confusion in trademarks is based on t… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

    Comments: 10 pages, 6 figures, 10 tables

  30. arXiv:1512.03543  [pdf, ps, other

    cs.GT cs.DS

    Hardness Results for Signaling in Bayesian Zero-Sum and Network Routing Games

    Authors: Umang Bhaskar, Yu Cheng, Young Kun Ko, Chaitanya Swamy

    Abstract: We study the optimization problem faced by a perfectly informed principal in a Bayesian game, who reveals information to the players about the state of nature to obtain a desirable equilibrium. This signaling problem is the natural design question motivated by uncertainty in games and has attracted much recent attention. We present new hardness results for signaling problems in (a) Bayesian two-pl… ▽ More

    Submitted 30 October, 2016; v1 submitted 11 December, 2015; originally announced December 2015.

  31. arXiv:1510.05886  [pdf, ps, other

    cs.DM cs.DS

    Approximation Algorithm for Minimum Weight Connected $m$-Fold Dominating Set

    Authors: Zhao Zhang, Jiao Zhou, Ker-I Ko, Ding-zhu Du

    Abstract: Using connected dominating set (CDS) to serve as a virtual backbone in a wireless networks can save energy and reduce interference. Since nodes may fail due to accidental damage or energy depletion, it is desirable that the virtual backbone has some fault-tolerance. A $k$-connected $m$-fold dominating set ($(k,m)$-CDS) of a graph $G$ is a node set $D$ such that every node in $V\setminus D$ has at… ▽ More

    Submitted 12 March, 2017; v1 submitted 20 October, 2015; originally announced October 2015.

    MSC Class: 68W25; 05C85 ACM Class: G.2.1; G.2.2

  32. arXiv:1505.03110  [pdf, ps, other

    cs.CC cs.IT quant-ph

    Near-optimal bounds on bounded-round quantum communication complexity of disjointness

    Authors: Mark Braverman, Ankit Garg, Young Kun Ko, Jieming Mao, Dave Touchette

    Abstract: We prove a near optimal round-communication tradeoff for the two-party quantum communication complexity of disjointness. For protocols with $r$ rounds, we prove a lower bound of $\tildeΩ(n/r + r)$ on the communication required for computing disjointness of input size $n$, which is optimal up to logarithmic factors. The previous best lower bound was $Ω(n/r^2 + r)$ due to Jain, Radhakrishnan and Sen… ▽ More

    Submitted 12 May, 2015; originally announced May 2015.

    Comments: 41 pages

  33. arXiv:1504.08352  [pdf, ps, other

    cs.CC

    ETH Hardness for Densest-$k$-Subgraph with Perfect Completeness

    Authors: Mark Braverman, Young Kun Ko, Aviad Rubinstein, Omri Weinstein

    Abstract: We show that, assuming the (deterministic) Exponential Time Hypothesis, distinguishing between a graph with an induced $k$-clique and a graph in which all k-subgraphs have density at most $1-ε$, requires $n^{\tilde Ω(log n)}$ time. Our result essentially matches the quasi-polynomial algorithms of Feige and Seltser [FS97] and Barman [Bar15] for this problem, and is the first one to rule out an addi… ▽ More

    Submitted 30 April, 2015; originally announced April 2015.

  34. arXiv:1103.5046  [pdf, other

    cs.IR cs.AI cs.HC

    From Linked Data to Relevant Data -- Time is the Essence

    Authors: Markus Kirchberg, Ryan K L Ko, Bu Sung Lee

    Abstract: The Semantic Web initiative puts emphasis not primarily on putting data on the Web, but rather on creating links in a way that both humans and machines can explore the Web of data. When such users access the Web, they leave a trail as Web servers maintain a history of requests. Web usage mining approaches have been studied since the beginning of the Web given the log's huge potential for purposes… ▽ More

    Submitted 25 March, 2011; originally announced March 2011.

    Comments: 1st International Workshop on Usage Analysis and the Web of Data (USEWOD2011) in the 20th International World Wide Web Conference (WWW2011), Hyderabad, India, March 28th, 2011

    Report number: WWW2011USEWOD/2011/kirkolee

  35. arXiv:1008.4938  [pdf

    q-bio.QM cs.SC

    Towards Solving the Inverse Protein Folding Problem

    Authors: Yoojin Hong, Kyung Dae Ko, Gaurav Bhardwaj, Zhenhai Zhang, Damian B. van Rossum, Randen L. Patterson

    Abstract: Accurately assigning folds for divergent protein sequences is a major obstacle to structural studies and underlies the inverse protein folding problem. Herein, we outline our theories for fold-recognition in the "twilight-zone" of sequence similarity (<25% identity). Our analyses demonstrate that structural sequence profiles built using Position-Specific Scoring Matrices (PSSMs) significantly outp… ▽ More

    Submitted 29 August, 2010; originally announced August 2010.

    Comments: 22 pages, 11 figures