{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:48:31Z","timestamp":1729630111740,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/isda.2011.6121801","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T16:43:43Z","timestamp":1325868223000},"page":"1074-1079","source":"Crossref","is-referenced-by-count":0,"title":["On the use of algorithms to discover motifs in DNA sequences"],"prefix":"10.1109","author":[{"given":"C.","family":"Rubio-Escudero","sequence":"first","affiliation":[]},{"given":"F.","family":"Martinez-Alvarez","sequence":"additional","affiliation":[]},{"given":"M.","family":"Martinez-Ballesteros","sequence":"additional","affiliation":[]},{"given":"J. C.","family":"Riquelme","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"262","article-title":"An exact method for finding short motifs in sequences, with application to the ribosome binding site problem","author":"tompa","year":"1999","journal-title":"Proc Seventh Int l Conf Intelligent Systems in Molecular Biology"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2091-10-17"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1126\/science.1105136"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2008.11.005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkq330"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/a2010582"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/16.1.16"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1093\/dnares\/dsp014"},{"key":"ref35","first-page":"111","article-title":"Spelling approximate repeated or common motifs using a suffix tree","volume":"1380","author":"sagot","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1007\/s00214-009-0648-3","article-title":"Optimization of multiclassifiers for computational biology: Application to gene finding and gene expression","volume":"125","author":"rubio-escudero","year":"2010","journal-title":"Theoretical Chemistry Accounts"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1053"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1186\/gb-2006-7-s1-s2","article-title":"EGASP: the human ENCODE Genome Annotation Assessment Project","author":"guig\u00f3","year":"2006","journal-title":"Genome Biology"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1998.1947"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0008938"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth0805-575"},{"journal-title":"Naive Set Theory","year":"1960","author":"halmos","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gki791"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"4899","DOI":"10.1186\/1471-2105-7-342","article-title":"EMD: An ensemble algorithm for discovering regulatory motifs in DNA sequences","volume":"7","author":"hu","year":"2006","journal-title":"BMC Bioinformatics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1198\/016214507000000365"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm473"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-189"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti256"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"10096","DOI":"10.1073\/pnas.180265397","article-title":"From the cover building a dictionary for genomes: Identification of presumptive regulatory sites by statistical analysis","author":"bussemaker","year":"2000","journal-title":"Proceedings of the National Academy of Science of the USA"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2006.05.023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1006\/geno.1996.0298"},{"key":"ref6","first-page":"4","article-title":"Structural analysis of regulatory DNA sequences using grammar inference and support vector machine","author":"damasevicius","year":"2010","journal-title":"Neurocomputing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1089\/106652700750050826"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1504\/IJCBDD.2009.028822"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/nature02800"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-S7-S21"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1101\/gr.8.11.1202","article-title":"Predicting gene regulatory elements in silico on a genomic scale","volume":"8","author":"brazma","year":"2000","journal-title":"Genome Research"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-11-179"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1101\/gr.1562804","article-title":"Computational gene prediction using multiple sources of gene evidence","volume":"14","author":"allen","year":"2004","journal-title":"Genome Research"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87442-3_24"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2010-11-1-r7"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm118"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17534-3_30"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2005.853667"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-463"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1266\/ggs.84.81"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12211-8_5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.2000.3576"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-12-S1-S16"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/28.8.1808"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2010.02.010"},{"journal-title":"Disappearing Cryptography","year":"2002","author":"wayner","key":"ref44"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btn004"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gki492"}],"event":{"name":"2011 11th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2011,11,22]]},"location":"Cordoba, Spain","end":{"date-parts":[[2011,11,24]]}},"container-title":["2011 11th International Conference on Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112291\/6121619\/06121801.pdf?arnumber=6121801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,25]],"date-time":"2021-12-25T05:35:06Z","timestamp":1640410506000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6121801\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/isda.2011.6121801","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}