Utility-Aware Screening with Clique-Oriented Prioritization

被引:5
|
作者
Swamidass, S. Joshua [1 ,2 ]
Calhoun, Bradley T.
Bittker, Joshua A. [2 ]
Bodycombe, Nicole E. [2 ]
Clemons, Paul A. [2 ]
机构
[1] Washington Univ, Sch Med, Dept Pathol & Immunol, Div Lab & Genom Med, St Louis, MO 63130 USA
[2] Broad Inst Harvard & MIT, Chem Biol Program, Cambridge, MA USA
关键词
THROUGHPUT; ENRICHMENT; DISCOVERY;
D O I
10.1021/ci2003285
中图分类号
R914 [药物化学];
学科分类号
100701 ;
摘要
Most methods of deciding which hits from a screen to send for confirmatory testing assume that all confirmed actives are equally valuable and aim only to maximize the number of confirmed hits. In contrast, "utility-aware" methods are informed by models of screeners' preferences and can increase the rate at which the useful information is discovered. Clique-oriented prioritization (COP) extends a recently proposed economic framework and aims by changing which hits are sent for confirmatory testing to maximize the number of scaffolds with at least two confirmed active examples. In both retrospective and prospective experiments, COP enables accurate predictions of the number of clique discoveries in a batch of confirmatory experiments and improves the rate of clique discovery by more than 3-fold. In contrast, other similarity-based methods like ontology-based pattern identification (OPI) and local hit-rate analysis (LHR) reduce the rate of scaffold discovery by about half. The utility-aware algorithm used to implement COP is general enough to implement several other important models of screener preferences.
引用
收藏
页码:29 / 37
页数:9
相关论文
共 50 条
  • [41] A framework for personalized utility-aware IP-based multimedia consumption
    Prangl, Martin
    Hellwagner, Hermann
    2007 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOL 1, 2007, : 476 - 478
  • [42] Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program Traces
    Pal, Asmita
    Desai, Keerthana
    Chatterjee, Rahul
    Miguel, Joshua San
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2024, 21 (02)
  • [43] Utility-aware resource allocation for multi-stream overlay multicast
    Xu, Ji
    Liu, Jiangchuan
    Chen, Hsiao-Hwa
    Chu, Xiaowen
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 506 - +
  • [44] A new utility-aware anonymization model for privacy preserving data publishing
    Canbay, Yavuz
    Sagiroglu, Seref
    Vural, Yilmaz
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (10):
  • [45] A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment
    Yao, Lin
    Wang, Xue
    Hu, Haibo
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2045 - 2056
  • [46] Privacy-preserving and Utility-aware Participant Selection for Mobile Crowd Sensing
    Azhar, Shanila
    Chang, Shan
    Liu, Ye
    Tao, Yuting
    Liu, Guohua
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01): : 290 - 302
  • [47] Privacy Preserving Utility-Aware Mechanism for Data Uploading Phase in Participatory Sensing
    Ben Messaoud, Rim
    Sghaier, Nouha
    Moussa, Mohamed Ali
    Ghamri-Doudane, Yacine
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (09) : 2160 - 2173
  • [48] A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs
    Jiang, Hongbo
    Wang, Mengyuan
    Zhao, Ping
    Xiao, Zhu
    Dustdar, Schahram
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (05) : 2228 - 2241
  • [49] Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces
    Gursoy, Mehmet Emre
    Liu, Ling
    Truex, Stacey
    Yu, Lei
    Wei, Wenqi
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 196 - 211
  • [50] RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking
    Luo, Bin
    Li, Xinghua
    Liu, Ximeng
    Ren, Yanbing
    Zhang, Man
    Guo, Jingjing
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 23201 - 23214