{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:45:46Z","timestamp":1729615546580,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/cibcb.2015.7300332","type":"proceedings-article","created":{"date-parts":[[2015,10,20]],"date-time":"2015-10-20T07:49:46Z","timestamp":1445327386000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Towards large scale genetic network modeling"],"prefix":"10.1109","author":[{"given":"Rubaiya Rahtin","family":"Khan","sequence":"first","affiliation":[]},{"given":"Madhu","family":"Chetty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"journal-title":"Evolutionary Computation in Bioinformatics","year":"2002","author":"fogel","key":"ref38"},{"key":"ref33","first-page":"193","article-title":"Inferring regulatory systems with noisy pathway information","author":"spieth","year":"2005","journal-title":"German Conference on Bioinformatics"},{"key":"ref32","volume":"31","author":"lehmann","year":"1998","journal-title":"Theory of Point Estimation"},{"key":"ref31","first-page":"205","article-title":"Reverse engineering genetic networks using evolutionary computation","volume":"16","author":"noman","year":"2005","journal-title":"Genome Informatics"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688625"},{"journal-title":"Likelihood","year":"1984","author":"edwards","key":"ref37"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.4324\/9780203771587","author":"cohen","year":"2013","journal-title":"Statistical Power Analysis for the Behavioral Sciences"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00234-2"},{"key":"ref34","first-page":"199","article-title":"Information theory and an extension of the maximum likelihood principle","author":"akaike","year":"0","journal-title":"Selected Papers of Hirotugu Akaike"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1252\/kakoronbunshu.25.220"},{"key":"ref40","article-title":"A comparison of fold-change and the t-statistic for microarray data analysis","author":"witten","year":"2007","journal-title":"Technical Report"},{"key":"ref11","first-page":"386","article-title":"Development of system identification technique based on real-coded genetic algorithm","volume":"13","author":"ueda","year":"2002","journal-title":"Genome Informatics"},{"key":"ref12","first-page":"382","article-title":"Inference of genetic network using the expression profile time course data of mouse p19 cells","volume":"13","author":"maki","year":"2002","journal-title":"Genome Informatics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1722024.1722069"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-syb.2008.0175"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5586248"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28349-8_2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.68"},{"key":"ref18","first-page":"269","article-title":"A survey of clustering algorithms","author":"rokach","year":"2010","journal-title":"Data Mining and Knowledge Discovery Handbook"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2007.1058"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2174\/138920209789177610"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144043"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-S6-S9"},{"journal-title":"Biochemical Systems Analysis A Study of Function and Design in Molecular Biology","year":"1976","author":"savageau","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2011.5949728"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2009.70"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti071"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/16.8.707"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299633"},{"journal-title":"Introduction to Computational Molecular Biology","year":"1997","author":"setubal","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1126\/science.1136800","article-title":"Clustering by passing messages between data points","volume":"315","author":"frey","year":"2007","journal-title":"Science"},{"journal-title":"Methods of Numerical Integration","year":"2007","author":"davis","key":"ref22"},{"article-title":"A memetic algorithm for reconstructing gene regulatory networks from expression profile","year":"2007","author":"noman","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/1752-0509-6-62"},{"key":"ref24","first-page":"137","article-title":"A survey of bio inspired optimization algorithms","volume":"2","author":"binitha","year":"2012","journal-title":"International Journal of Soft Computing and Engineering"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth448"},{"key":"ref23","first-page":"978","article-title":"Spline interpolation","author":"hazewinkel","year":"2001","journal-title":"Encyclopedia of Mathematics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2011.5949839"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024653025686"}],"event":{"name":"2015 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB)","start":{"date-parts":[[2015,8,12]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2015,8,15]]}},"container-title":["2015 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7295494\/7300268\/07300332.pdf?arnumber=7300332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T14:42:21Z","timestamp":1567262541000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7300332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/cibcb.2015.7300332","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}