Npgrj_ng_121 575..583
نویسندگان
چکیده
Michael N Weedon1,2,23, Hana Lango1,2,23, Cecilia M Lindgren3,4, Chris Wallace5, David M Evans6, Massimo Mangino7, Rachel M Freathy1,2, John R B Perry1,2, Suzanne Stevens7, Alistair S Hall8, Nilesh J Samani7, Beverly Shields2, Inga Prokopenko3,4, Martin Farrall9, Anna Dominiczak10, Diabetes Genetics Initiative21, The Wellcome Trust Case Control Consortium21, Toby Johnson11–13, Sven Bergmann11,12, Jacques S Beckmann11,14, Peter Vollenweider15, Dawn M Waterworth16, Vincent Mooser16, Colin N A Palmer17, Andrew D Morris18, Willem H Ouwehand19,20, Cambridge GEM Consortium22, Mark Caulfield5, Patricia B Munroe5, Andrew T Hattersley1,2, Mark I McCarthy3,4 & Timothy M Frayling1,2
منابع مشابه
A Characterization of the Plurality Rule
We consider an axiomatic characterization of the plurality rule, which selects the alternative(s) most preferred by the largest number of individuals. We strengthen the characterization result of Yeh (Economic Theory 34: 575–583, 2008) by replacing efficiency axiom by the weaker axiom called faithfulness. Formally, we show that the plurality rule is the only rule satisfying anonymity, neutralit...
متن کاملA Research Revolution: Genetic Testing Consumers Become Research (and Privacy) Guinea Pigs
INTRODUCTION ............................................................................. 574 I. BACKGROUND ..................................................................... 574 A. Regulation of Human Subject Research in the United States ... 575 1. Historical Examples of Abuse ....................................... 575 2. Current Laws ........................................................
متن کاملNew Frontiers in Computational Genomics: Identification of Novel Functional Elements and Genome-scale Pattern Analysis
Genomics researchers produce vast quantities of data that require detailed analysis. The amount of information makes it impossible to manually analyze the data. Thus, many bioinformatics software tools have been developed for the purpose of analyzing large-scale data distributed across numerous public data repositories. The discipline of bioinformatics, like the field of genomics, is in its inf...
متن کاملThe Violation of Cp Invariance
I. Introduction 575 1. The decay K° — • TT + W~. Basic experimental results 575 2. Attempts to explain the decay Kjj —-K*W~ without violation of CP invariance 576 3. The purpose of this article 577 4. The hypothesis of CPT invariance 577 5. A new interaction 578 6. The a particles 579 7. Summary of processes 579 n. Neutral K mesons 581 8. Description of K° mesons 581 9. The decays K^ — w*ir~ an...
متن کاملLearning from Corrupted Binary Labels via Class- Probability Estimation Classification with Corrupted Binary Labels
550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 6...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008