User profiles for Mélanie Schmidt
Melanie SchmidtHeinrich-Heine-Universität Düsseldorf Verified email at hhu.de Cited by 1630 |
Turning Big Data Into Tiny Data: Constant-Size Coresets for -Means, PCA, and Projective Clustering
We develop and analyze a method to reduce the size of a very large set of data points in a
high-dimensional Euclidean space $\mathbb{R}^d$ to a small set of weighted points such that …
high-dimensional Euclidean space $\mathbb{R}^d$ to a small set of weighted points such that …
[HTML][HTML] Transcription-mediated organization of the replication initiation program across large genes sets common fragile sites genome-wide
…, S El-Hilali, D Azar, S Koundrioukoff, M Schmidt… - Nature …, 2019 - nature.com
Common fragile sites (CFSs) are chromosome regions prone to breakage upon replication
stress known to drive chromosome rearrangements during oncogenesis. Most CFSs nest in …
stress known to drive chromosome rearrangements during oncogenesis. Most CFSs nest in …
[HTML][HTML] The creatine kinase system in human skin: protective effects of creatine against oxidative and UV damage in vitro and in vivo
H Lenz, M Schmidt, V Welge, U Schlattner… - Journal of Investigative …, 2005 - Elsevier
Cutaneous aging is characterized by a decline in cellular energy metabolism, which is mainly
caused by detrimental changes in mitochondrial function. The processes involved seem to …
caused by detrimental changes in mitochondrial function. The processes involved seem to …
On the cost of essentially fair clusterings
Clustering is a fundamental tool in data mining. It partitions points into groups (clusters) and
may be used to make decisions for each point based on its group. However, this process …
may be used to make decisions for each point based on its group. However, this process …
Improved and simplified inapproximability for k-means
The k-means problem consists of finding k centers in R d that minimize the sum of the squared
distances of all points in an input set P from R d to their closest respective center. Awasthi …
distances of all points in an input set P from R d to their closest respective center. Awasthi …
BICO: BIRCH Meets Coresets for k-Means Clustering
We design a data stream algorithm for the k-means problem, called BICO, that combines the
data structure of the SIGMOD Test of Time award winning algorithm BIRCH [27] with the …
data structure of the SIGMOD Test of Time award winning algorithm BIRCH [27] with the …
Mistimed origin licensing and activation stabilize common fragile sites under tight DNA-replication checkpoint activation
…, R Melendez-Garcia, SJ Kim, M Schmidt… - Nature Structural & …, 2023 - nature.com
Genome integrity requires replication to be completed before chromosome segregation.
The DNA-replication checkpoint (DRC) contributes to this coordination by inhibiting CDK1, …
The DNA-replication checkpoint (DRC) contributes to this coordination by inhibiting CDK1, …
Transcription-dependent regulation of replication dynamics modulates genome stability
M Blin, B Le Tallec, V Nähse, M Schmidt… - Nature structural & …, 2019 - nature.com
Common fragile sites (CFSs) are loci that are hypersensitive to replication stress and hotspots
for chromosomal rearrangements in cancers. CFSs replicate late in S phase, are cell-type …
for chromosomal rearrangements in cancers. CFSs replicate late in S phase, are cell-type …
[HTML][HTML] Effects of a ketogenic diet on the quality of life in 16 patients with advanced cancer: A pilot trial
M Schmidt, N Pfetzer, M Schwab, I Strauss… - Nutrition & …, 2011 - Springer
Background Tumor patients exhibit an increased peripheral demand of fatty acids and
protein. Contrarily, tumors utilize glucose as their main source of energy supply. Thus, a diet …
protein. Contrarily, tumors utilize glucose as their main source of energy supply. Thus, a diet …
On the use of network flow techniques for assigning evacuees to exits
…, J Kulbatzki, D Plümpe, G Schlechter, M Schmidt… - Procedia …, 2010 - Elsevier
We apply network flow techniques to find good exit selections for evacuees in an emergency
evacuation. More precisely, we present two algorithms for computing exit distributions using …
evacuation. More precisely, we present two algorithms for computing exit distributions using …