2017
DOI: 10.1007/s10619-017-7209-x
|View full text |Cite
|
Sign up to set email alerts
|

Crowd enabled curation and querying of large and noisy text mined protein interaction data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 84 publications
0
4
0
Order By: Relevance
“…information extraction, named entity recognition) and document retrieval techniques, given the intractable publication volumes and intrinsic difficulties in professional curation, curators alone cannot ‘move the mountain’ that is ever growing ( 1 , 35 , 36 ). Alternative curation strategies have been proposed and used: crowd-sourcing ( 37 , 38 ) (see ( 39 ) on strategies of using crowd-sourced data that are of lower quality in general) and curation involving authors ( 35 , 36 ). In an experiment, the journal FEBS Letters requested consenting authors to submit a structured abstract, containing the identifiers of interacting proteins, their interaction types and the experimental method used.…”
Section: Related Workmentioning
confidence: 99%
“…information extraction, named entity recognition) and document retrieval techniques, given the intractable publication volumes and intrinsic difficulties in professional curation, curators alone cannot ‘move the mountain’ that is ever growing ( 1 , 35 , 36 ). Alternative curation strategies have been proposed and used: crowd-sourcing ( 37 , 38 ) (see ( 39 ) on strategies of using crowd-sourced data that are of lower quality in general) and curation involving authors ( 35 , 36 ). In an experiment, the journal FEBS Letters requested consenting authors to submit a structured abstract, containing the identifiers of interacting proteins, their interaction types and the experimental method used.…”
Section: Related Workmentioning
confidence: 99%
“…To be helpful for a certifiable application, a provenance framework ought to give offices to manipulate and query provenance data [2]. If a provenance framework handles transformations at different degrees of detail, it should provenance components for merging different transformations into one transformations and split an unpredictable change into an arrangement of less complex changes.…”
Section: A Query and Manipulation Functionalitiesmentioning
confidence: 99%
“…Where Cgas are the total transaction costs in gas, Nbytes is the contract size in bytes and Nwords is the number of 256 bit words that are initialized in the constructor. To calculate the deployment price in US-Dollar, the gas usage has to be multiplied with the the gasprice Pgas and the US-Dollar exchange rate for the ether Pexchange using equation (2).…”
Section: A Deployment Costsmentioning
confidence: 99%
“…e standard approach practiced in similar circumstances such as GitHub is to accept only administrator curated annotations, and allow local overriding by any user on their own without a ecting the community annotation. e second approach is to use an inaccurate model where the reliability of an annotation is dependent upon the combined credibility of all the curators who contributed to the annotation, an approach adopted in CrowdCure system [15]. e current edition of CodeMapper does not allow hypothetical concepts, or their implementation, to be included in a concept graph for a solution.…”
Section: Limitations and Future Improvementsmentioning
confidence: 99%