Volume 11 Supplement 1
Selected articles from the Eighth Asia-Pacific Bioinformatics Conference (APBC 2010)
Fast motif recognition via application of statistical thresholds
- Christina Boucher^{1}Email author and
- James King^{2}
https://doi.org/10.1186/1471-2105-11-S1-S11
© Boucher and King; licensee BioMed Central Ltd. 2010
Published: 18 January 2010
Abstract
Background
Improving the accuracy and efficiency of motif recognition is an important computational challenge that has application to detecting transcription factor binding sites in genomic data. Closely related to motif recognition is the CONSENSUS STRING decision problem that asks, given a parameter d and a set of ℓ-length strings S = {s_{1}, ..., s_{ n }}, whether there exists a consensus string that has Hamming distance at most d from any string in S. A set of strings S is pairwise bounded if the Hamming distance between any pair of strings in S is at most 2d. It is trivial to determine whether a set is pairwise bounded, and a set cannot have a consensus string unless it is pairwise bounded. We use CONSENSUS STRING to determine whether or not a pairwise bounded set has a consensus. Unfortunately, CONSENSUS STRING is NP-complete. The lack of an efficient method to solve the CONSENSUS STRING problem has caused it to become a computational bottleneck in MCL-WMR, a motif recognition program capable of solving difficult motif recognition problem instances.
Results
We focus on the development of a method for solving CONSENSUS STRING quickly with a small probability of error. We apply this heuristic to develop a new motif recognition program, sMCL-WMR, which has impressive accuracy and efficiency. We demonstrate the performance of sMCL-WMR in detecting weak motifs in large data sets and in real genomic data sets, and compare the performance to other leading motif recognition programs. In our preliminary discussion of our CONSENSUS STRING algorithm we give insight into the issue of sampling pairwise bounded sets, and discuss its relevance to motif recognition.
Conclusion
Our novel heuristic gives birth to a state of the art program, sMCL-WMR, that is capable of detecting weak motifs in data sets with a large number of strings. sMCL-WMR is orders of magnitude faster than its predecessor MCL-WMR and is capable of solving previously unsolved synthetic motif recognition problems. Lastly, sMCL-WMR shows impressive accuracy in detecting transcription factor binding sites in the genomic data and used in the assessment of Tompa et al.
Background
Given a number of DNA strings, motif recognition is the task of discovering similar substrings without prior knowledge of their consensus or their locations. The following is a combinatorial formulation of the (ℓ, d)-motif problem [1]: let S = {s_{1}, ..., s_{ n }} be a set of m-length strings, and s* be the consensus string, a fixed and unknown string of length ℓ that is contained in each s_{ i }as a substring but is corrupted with at most d substitutions (point mutations). The aim is to determine s* and the location of the motif instances in each string. The weak motif recognition problem is to find the motif instances when the number of degenerate positions d is large in relation to the motif length ℓ; well-known weak motif recognition problems exist when the parameters (ℓ, d) are equal to (11, 3), (15, 4), and (18, 6). This combinatorial problem has application to finding transcription factor binding sites in genomic data [2].
Motif recognition is NP-complete and therefore cannot be solved in polynomial time unless P = NP [3]. Nonetheless, there are numerous algorithms developed to solve specific instances of the problem, including PROJECTION [4], Winnower [1], pattern driven approaches [5], MITRA [6], PSM1 [7], PMSprune [8], the Voting algorithm [9], MCL-WMR [10], MEME [11], VAS [12], RISOTTO [13], Weeder [14] and several others. Li et al. proved the existence of a PTAS for an optimization version of the motif recognition problem, though the high degree in the polynomial complexity of the PTAS algorithm renders this result only of theoretical interest [15].
Closely related to motif recognition is the CONSENSUS STRING decision problem. A consensus string for a set S of strings has Hamming distance at most d from all strings in S. CONSENSUS STRING asks, given a parameter d and a set S = {s_{1}, ..., s_{ n }} of n strings, each of length ℓ, whether there exists a consensus string for S. CONSENSUS STRING is NP-complete even when interest is limited to the binary alphabet [16].
For a given parameter d we say S is a motif set if there exists a consensus string s* at distance at most d from any string in S; we say a set S of strings is pairwise bounded if the distance between any pair of strings in S is at most 2d. Every motif set is pairwise bounded; if a pairwise bounded set is not a motif set we say it is a decoy set. For example, for d = 1 the set {000, 001, 010, 100} is a motif set because 000 is a consensus string for this set. In contrast, the set {000, 011, 101, 110} is a decoy set because it is pairwise bounded (since any two of the strings are at Hamming distance 2) but no consensus string exists.
The focus of this paper is the development and application of a heuristic for the CONSENSUS STRING decision problem (also known as the RADIUS DECISION problem [16]). We denote the Hamming distance between any pair of strings s_{ i }and s_{ j }as H(s_{ i }, s_{ j }). We define the weight of a set of strings S as the sum of the Hamming distances of each pair of strings in S (i.e. Σ_{1 ≤ i ≤ j ≤ n}H(s_{ i }, s_{ j })). If the weight of a set, which can be calculated in polynomial time, can be used to indicate whether it is a motif set or a decoy set then CONSENSUS STRING can be solved extremely efficiently and accurately in practice--simply calculate the weight of the pairwise bounded set and decide whether the set has a consensus based on this value. For this heuristic to work we need to know how the respective weights of a random motif set and a random decoy set are distributed. Further, the distributions need to be adequately separated so that the weight of a set leaves little ambiguity as to whether the set is a motif set or a decoy set.
There exists an algorithm to sample from the set of all motif sets: simply choose any ℓ-length string as the consensus sequence and sample with replacement from the set of all strings that are at distance at most d from that sequence [10]. Unfortunately we do not know an analogous sampling algorithm, either exact or approximate, for decoy sets. If we could sample pairwise bounded sets uniformly then we could learn the probability distribution of the weight of a random decoy set.
We give a method to generate pairwise bounded sets uniformly, use this method to determine the probability distribution of the weight of a random decoy set, and show the existence of a separation between this distribution and the probability distribution of the weight of a random motif set. Thus, we solve CONSENSUS STRING instances extremely accurately and efficiently using the simple heuristic of using the weight as an indicator as to whether a pairwise bounded set is a motif set or a decoy set. The separation of the distributions becomes increasingly more prevalent as the number of strings in the set (i.e. the parameter n) increases, so the accuracy of our method increases as the number of strings increases. We significantly extend our earlier motif recognition program, MCL-WMR [10], by incorporating the heuristic for CONSENSUS STRING described in this paper. This new algorithm, referred to as sMCL-WMR, detects motifs in data sets with a large number of strings (i.e. 30 or more strings), and finds regulatory strings in genomic data. sMCL-WMR represents the input data as a weighted graph and uses graph clustering to narrow the search to smaller problems that can be solved with significantly less computation. An efficient refinement algorithm that distinguishes valid motif sets from decoy sets allows sMCL-WMR to detect motifs in very large data sets in significantly less computational time than MCL-WMR.
Methods
Sampling pairwise bounded sets
In this section we discuss uniform sampling, or generation, of pairwise bounded sets. A standard method used to generate a random motif set is to choose an ℓ-length string u.a.r. (uniformly at random) from all possible 4^{ℓ} strings to be the consensus string, and then form a motif set by selecting n strings at random with replacement from the set of all strings with Hamming distance at most d from this consensus string [4, 10]. This does not sample motif sets uniformly, but rather samples a motif set with probability proportional to the number of distinct consensus strings it has and thus, corresponds to how synthetic problem data sets are constructed and how we expect meaningful motif sets arise in nature. For example, synthetic problem instances are traditionally generated as follows: a random consensus string of length ℓ is chosen, n occurrences of the motif are generated by randomly mutating at most d positions, and each of the n motif instances is embedded at a random location into a different background string of length m. We note that other non-uniform distributions have also been used to generate motif sets [1].
When sampling uniformly from a poorly understood sample set, rejection sampling is a naïve but useful technique. If we can find a superset of the target set that is easy to sample from uniformly, we can sample from this superset and simply throw away (reject) any sampled element that is not in the target set. We show how rejection sampling can be applied to generate pairwise bounded sets uniformly.
Uniform sampling of pairwise bounded sets
To sample u.a.r. from all pairwise bounded sets using rejection sampling in the most naïve way, we would generate n random ℓ-length strings and accept the set if it is pairwise bounded, and reject and repeat otherwise (technically this samples uniformly from pairwise bounded sequences since the order of the strings matters in a sequence). However, since it is unlikely that such a randomly generated set would be pairwise bounded, this method is extremely inefficient. We introduce a heuristic to generate random sets that are more likely to be pairwise bounded, thus speeding up the rejection sampling process enough to be practical.
We generate the first string, s_{1}, u.a.r. from the set of all ℓ-length strings then generate each of s_{2}, ..., s_{ n }in turn u.a.r. from the set of all strings at distance at most 2d from s_{1}. This gives us a set of strings generated u.a.r. from the set of all strings that have s_{1} as the first string and each other string at distance at most 2d from s_{1}. If the set is pairwise bounded we keep it; if it is not we reject it and start over. The fact that this method generates pairwise bounded sequences u.a.r. can be verified by induction on n. The number of times a set of n strings is considered and rejected until a pairwise bounded set is generated follows a geometric distribution and therefore, the efficiency of this method is determined by the probability that a set is rejected. Though this method is fast enough to work in practice for values of n we are interested in, the expected runtime when generating a single pairwise bounded set grows exponentially with n.
Proposition 1. The probability that a set generated using rejection sampling is pairwise bounded decreases at least exponentially fast as a function of n.
Proof. For 1 ≤ i ≤ n let S_{ i }be the subset of S containing the first i randomly chosen strings, with S_{ n }= S. Let A_{ i }be the event that S_{ i }is pairwise bounded. Any subset of a pairwise bounded set is pairwise bounded, so A_{ i }implies A_{i-1}for 2 ≤ i ≤ n. Therefore by Bayes' law we have ℙ[A_{ i }] = ℙ[A_{ i }|A_{i-1}] ℙ[A_{i-1}]. To prove that ℙ[A_{ n }] decays exponentially with n we need only show that ℙ[A_{ i }|A_{i-1}] is non-increasing in i, since it can easily be verified to be strictly less than 1 for i = 3. Let K_{ i }be the set of strings such that S_{ i }∪ {s} is pairwise bounded if and only if s ∈ K_{ i }, noting that K_{ i }= ∅ if S_{ i }is not pairwise bounded. We have K_{ j }⊆ K_{ i }for any 1 ≤ i <j ≤ n. Since , where B(2d) is the number of strings at distance at most 2d from s_{1}, the result holds. □
To empirically evaluate the efficiency of our rejection sampling method we determined the portion of sets that will be rejected when generating a sample (of specified size) of pairwise bounded sets. We performed experiments with varying values of n, ℓ, and d, generated 10000 pairwise bounded sets in each experiment, and considered the average number of sets rejected before the pairwise bounded set was obtained. The default values for (n, ℓ, d) are (20, 15, 4).
A separation of weight distributions
As the value of n increases, the separation between the distributions becomes more prevalent since the probability distributions become more concentrated around their means and the means themselves diverge. Further, the dichotomy is again more evident when (ℓ, d) is increased from (15, 4) to (18, 6). When n is even moderately large we can use the weight to determine accurately whether the set is a motif set or a decoy set and as n increases this method of using the weight as an indicator will likely increase in accuracy. Similar conclusions can be made when ℓ and d increase. These results suggest that the simple heuristic of using the weight to determine whether a pairwise bounded set is a valid motif set or a decoy set will enable computationally challenging instances of the CONSENSUS STRING problem (e.g. when n ≥ 20 or (l, d) is equal to (18, 6)) to be solved efficiently with minimal probability of error.
These empirical trends illustrate the analytical results of Boucher et al. [10] that demonstrate that the distribution of the weight of a random motif set is tightly concentrated around its mean. The following theorem proves that the distribution of W_{ m }is sharply concentrated around its mean; specifically it provides exponential tail bounds.
It is currently open to prove an analogous result to Theorem 1 for an arbitrary decoy set. This is a considerably more challenging problem due to the lack of a combinatorial characterization of a decoy set.
sMCL-WMR: an efficient method to detect motifs in large data sets
In 2007, MCL-WMR was developed specifically for the problem of detecting weak motifs in genomic data [10]. One of the main contributions of MCL-WMR is the introduction of a novel weighted-graph model for motif recognition. Unfortunately, MCL-WMR was unable to detect motifs beyond when ℓ = 18, d = 6, m = 1000, and n ≥ 20 [10]. Eskin and Pevzner reported similar results for various motif recognition programs [6], and Feng et al. showed limited accuracy for the (15, 4) problem with 20 strings of length 600 [17]. Specific motif recognition problems--that is, the problem for specific values of n, m, ℓ, and d--have remained intractable. For example, MCL-WMR was unable to solve any instance of the (25, 8) motif recognition problem with n = 20.
MCL-WMR uses graph clustering to determine pairwise bounded sets that might be valid motifs. The major impediment to the efficiency of MCL-WMR was the exponential-time refinement algorithm used to determine which "candidate motif sets" (i.e. pairwise bounded sets) have a consensus string [10]; this step becomes a bottleneck for solving challenging weak motif instances, such as (18, 6), when the number of such candidate sets increases dramatically [4]. Boucher and Brown [18] give a probabilistic heuristic for solving the consensus string problem, which filters candidate sets based on a "majority vote", that has acceptable accuracy when n is significantly large (i.e. when n ≥ 20). We propose a probabilistic algorithm that eliminates the need for a strong bound on n; our novel algorithm uses a candidate set's weight to determine quickly and with a small probability of error whether the set is a decoy set or a motif set.
Overview of system
- 1.
The vertex set contains a vertex v_{i, j}representing the ℓ-length substring in string i starting at position j, for each i and j = 1, 2, ..., m - ℓ + 1. There are n(m - ℓ + 1) vertices.
- 2.
Each pair of vertices v_{i, j}and v_{i', j'}, for i ≠ i' is joined by an edge if and only if the corresponding substrings are at Hamming distance at most 2d.
- 3.
An edge between vertices having distance k has weight ℓ - k for d <k ≤ 2d, or 10(ℓ - k) for k ≤ d. This emphasizes substrings at small distances.
We chose to use the Markov cluster algorithm (MCL) [19] to cluster the graph due to its ability to handle large weighted graphs. We reduce the size of the instance being passed to MCL by considering subgraphs = {G_{1}, G_{2}, ..., G_{m-ℓ+1}}, where, for some arbitrary choice of reference string R, G_{ j }is the subgraph induced by the closed neighborhood of the reference vertex v_{R, j}. This is more efficient than searching all of at once. MCL then clusters each G_{ i }∈ to determine subgraphs that are highly interconnected (high edge weight within a cluster). A clique in G_{ i }that represents a pairwise bounded set must have size n and have weight at least (ℓ - 2d) since each pair of vertices must be adjacent. We filter out the clusters produced by MCL that do not meet these criteria since they cannot contain sufficiently large cliques. MCL-WMR uses a dynamic programming algorithm to determine which pairwise bounded sets (or cliques) represent valid motif sets; this computationally intensive step limits its ability to solve many motif recognition instances.
If α_{ m }<α_{ d }then we can use the weight of a pairwise bounded set of strings to determine whether the set is a decoy or a motif as follows: calculate the weight w of the set and, if w ≤ α_{ m }or w ≥ α_{ d }then return that the set is a motif or a decoy, respectively; otherwise, use the dynamic programming algorithm to classify the set. Hence, if α_{ m }<α_{ d }then more than 99% of pairwise bounded sets will be classified correctly by considering the weight of the set. Typically the gap between α_{ m }and α_{ d }is large enough to guarantee that this rate is far higher than 99%. In theory it is possible that a set could be misclassified (e.g. if a motif set has weight greater than α_{ d }) though in practice the probability of this happening is negligible and does not affect the performance of the algorithm.
Weight distribution properties.
(ℓ, d) | μ _{ m } | μ _{ d } | α _{ m } | α _{ d } | n | μ _{ m } | μ _{ d } | α _{ m } | α _{ d } | ||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
(15, 4) | 794 | 1439 | 84 | 84 | 989 | 1243 | 15 | 432 | 980 | 52 | 60 | 552 | 840 |
(16, 5) | 850 | 1651 | 86 | 102 | 1050 | 1413 | 20 | 794 | 1439 | 84 | 84 | 989 | 1243 |
(18, 6) | 899 | 2204 | 89 | 140 | 1106 | 1878 | 25 | 1529 | 2250 | 129 | 110 | 1829 | 1994 |
(25, 8) | 954 | 2670 | 111 | 175 | 1212 | 2262 | 30 | 1845 | 3263 | 196 | 169 | 2300 | 2869 |
(28, 9) | 1024 | 3230 | 152 | 199 | 1378 | 2767 | 35 | 2240 | 4523 | 246 | 213 | 2812 | 4027 |
(30, 11) | 1069 | 3882 | 169 | 245 | 1462 | 3312 | 40 | 3709 | 6110 | 389 | 275 | 4613 | 5460 |
Results and discussion
Performance of sMCL-WMR on synthetic data
We follow the experimental methods of Pevzner and Sze [1], and Buhler and Tompa [4] by considering the performance of sMCL-WMR in comparison to other contemporary and well-known motif recognition programs on synthetic data. We fix n to be equal to 20, m to be 600, and consider varied values of ℓ and d. To produce random motif recognition instances, we generate a random motif consensus of length ℓ, then generate n occurrences of the motif, each generated from the consensus by randomly choosing d positions and for each of the d positions choosing a random replacement base from the four possible bases (A, C, G, T). We construct m background strings of length n and insert the generated motifs into a random position in the string. For each of the (ℓ, d) combinations, 100 randomly generated sets of input strings (n = 20, m = 1000) were generated. The implementation of sMCL-WMR is in C++.
We note that all experimental tests were performed on a Linux machine with a 64-bit 2600 MHz processor and 1 Gbyte of RAM running Ubuntu. We compared the performance of sMCL-WMR with that of the following motif recognition programs: PROJECTION [4], MCL-WMR [10], PMSprune [8], and Voting [9]. All programs were run on the same Linux machine with the same data sets. These motif recognition programs were chosen for their availability, performance, and widespread use; they are appropriate for comparison with sMCL-WMR because of the previously described capability in solving weak motif instances and because of their availability to be run on the described machine. The results of Voting, PMSprune, and PROJECTION are similar to the ones reported by Davila et al. [8], and to Chin and Leung [12], both of whose testing was completed on a machine with a slightly slower processor and the same core memory size.
Performance on synthetic data with varying (ℓ, d).
(ℓ, d) | sMCL-WMR | MCL-WMR | PROJECTION | Voting | PMSprune |
---|---|---|---|---|---|
(10, 2) | 15 | 1020 | 56 (98%) | < 1 | 12 |
(12, 3) | 24 | 2780 | 321 (85%) | 28.4 | 23 |
(14, 4) | 98 | 3120 | 658 (75%) | 412 | 102 |
(16, 5) | 253 | 4101 | 1312 (80%) | 1620 | 520 |
(18, 6) | 632 | 10202 | 2200 (85%) | 4210 | 33560 |
(20, 7) | 1203 | - | 2700 (75%) | 20021 | - |
(25, 9) | 1502 | - | - | - | - |
(28, 12) | 1691 | - | - | - | - |
(30, 14) | 2002 | - | - | - | - |
Performance on synthetic data with varying n.
n | sMCL-WMR | MCL-WMR | PROJECTION | Voting | PMSprune |
---|---|---|---|---|---|
18 | 223 | 5320 | 698 (85%) | 3930 | 37020 |
20 | 243 | 12032 | 729 (77%) | 5201 | 45030 |
24 | 1354 | 36112 | 874 (75%) | 10211 | - |
28 | 1960 | - | - | - | - |
30 | 2504 | - | - | - | - |
40 | 3203 | - | - | - | - |
Using sMCL-WMR to find regulatory elements
An important biological challenge is to identify DNA binding sites of transcription factors. In this section, we demonstrate the use of sMCL-WMR in discovering these DNA string "motifs" in data sets with a large number of DNA strings. Tompa et al. extensively assess 13 motif recognition tools [2] using test sets that make use of transcription factor binding sites. The binding sites were obtained from the TRANSFAC database [20] which contains only eukaryotic transcription factors. The TRANSFAC database is extremely comprehensive, containing data from a large variety of species, including yeast, mus, oryctolagus cuniculus, and homo sapiens [20]. For more details concerning the data set, including the selection process for transcription factors and binding sites from TRANSFAC, see Tompa et al. [2].
Motif recognition on biological data.
Data set | Published motif | Motif pattern discovered | Motif recognition program | ℓ | d | Time (CPU sec.) |
---|---|---|---|---|---|---|
hm01 | gggaggctgaggcatgag | cggaggcctaagcctcag | GLAM [22] | 18 | 8 | 42.1 |
hm03 | Cagccaggctgcagtgctg | Catccatacagaa | GLAM [22] | 13 | 6 | 12.3 |
hm04 | gcgatgtgtaatagtcgc | gacatgtgtaaaaga | MEME [11] | 15 | 9 | 54.2 |
hm08 | ggagaaattctaa | aTGACgTC | Weeder [14] | 13 | 6 | 4.34 |
hm20 | ctgTAatc | gagTAaac | MITRA [6] | 8 | 3 | 6.7 |
hm26 | GCCGGC | GCCGGC | MITRA [6] | 6 | 0 | 3.44 |
Conclusion
In this paper we investigate the relationship between the weight of a decoy set and the weight of a motif set by means of random sampling. We discuss a rejection sampling strategy, and propose a means to make this uniform sampling method more efficient. Using our proposed sampling algorithm, we study the probability distributions of the respective weights of a random motif set and a random decoy set. We conclude that the weight of a pairwise bounded set can accurately predict whether the set is a valid motif set; we then use this heuristic to develop a program that efficiently detects motifs in large data sets. Our focus was to develop an efficient program that solves a combinatorial version of the motif recognition problem. A position weight matrix (PWM) is another commonly used representation of motifs in biological strings [21]. The application of techniques described in this paper - graph clustering and satistical thresholds - to the PWM model of motif recognition warrants further investigation.
Declarations
Acknowledgements
This project was supported by the National Sciences and Engineering Research Council of Canada and the Walter C. Sumner Memorial Fellowship. The authors are grateful to Daniel G. Brown for his discussions and insights concerning the results presented in this paper, and Francis Y.L. Chin and Henry C.M. Leung for making their motif recognition program available to us. We are also grateful to the referees for their many helpful comments.
This article has been published as part of BMC Bioinformatics Volume 11 Supplement 1, 2010: Selected articles from the Eighth Asia-Pacific Bioinformatics Conference (APBC 2010). The full contents of the supplement are available online at http://www.biomedcentral.com/1471-2105/11?issue=S1.
Authors’ Affiliations
References
- Pevzner P, Sze S: Combinatorial approaches to finding subtle signals in DNA strings. Proc ISMB 2000 2000, 269–278.Google Scholar
- Tompa M, Li N, Bailey TL, Church GM, De Moor B, Eskin E, Favorov AV, Frith MC, Fu Y, Kent WJ, et al.: Assessing computational tools for the discovery of transcription factor binding sites. Nat Biotechnol 2005, 23: 137–144. 10.1038/nbt1053View ArticlePubMedGoogle Scholar
- Evans PA, Smith A, Wareham HT: On the complexity of finding common approximate substrings. Theor Comput Sci 2003, 306(1–3):407–430. 10.1016/S0304-3975(03)00320-7View ArticleGoogle Scholar
- Buhler J, Tompa M: Finding motifs using random projections. J Comput Biol 2002.Google Scholar
- Sze S, Lu S, Chen J: Integrating sample-driven and patter-driven approaches in motif finding. Proc WABI 2004 2004, 438–449.Google Scholar
- Eskin E, Pevzner P: Finding composite regulatory patterns in DNA strings. Bioinformatics 2002, 18(Suppl 1):S354-S363.View ArticlePubMedGoogle Scholar
- Rajasekaran S, Balla S, Huang CH: Exact algorithms for planted motif problems. J Comput Biol 2005, 12(8):1117–1128. 10.1089/cmb.2005.12.1117View ArticlePubMedGoogle Scholar
- Davila J, Balla S, Rajasekaran S: Fast and practical algorithms for planted ( l , d ) motif search. TCBB 2007, 4(4):544–552.Google Scholar
- Chin FYL, Leung CM: Voting algorithms for discovering long motifs. Proc APBC 2005 2005, 261–271.Google Scholar
- Boucher C, Church P, Brown D: A graph clustering approach to weak motif recognition. Proc WABI 2007 2007, 149–160.Google Scholar
- Bailey TL, Elkan C: The value of prior knowledge in discovering motifs with MEME. Proc ISMB 1995 1995, 21–29.Google Scholar
- Chin FYL, Leung CM: An efficient algorithm for string motif discovery. Proc APBC 2006 2006, 79–88.Google Scholar
- Pisanti N, Carvalho A, Marsan L, Sagot MF: RISOTTO: Fast extraction of motifs with mismatches. Proc LATIN 2006 2006, 757–768. full_textGoogle Scholar
- Pavesi G, Mereghetti P, Mauri G, Pesole G: Weeder Web: discovery of transcription factor binding sites in a set of sequences from co-regulated genes. Nucleic Acids Res 2004, 32(Web Server issue):W199-W203. 10.1093/nar/gkh465PubMed CentralView ArticlePubMedGoogle Scholar
- Li M, Ma B, Wang L: Finding similar regions in many strings. J Comput Syst Sci 2002, 65: 73–96. 10.1006/jcss.2002.1823View ArticleGoogle Scholar
- Frances M, Litman A: On covering problems of codes. Theor Comput Syst 1997, 30(2):113–119.View ArticleGoogle Scholar
- Feng WS, Wang Z, Wang L: Identification of distinguishing motifs. Proc CPM 2007 2007, 253–264.Google Scholar
- Boucher C, Brown D: Detecting motifs in a large data set: applying probabilistic insights to motif finding. Proc BICoB 2009 2009, 139–150.Google Scholar
- van Dongen S: Graph clustering by flow simulation. PhD thesis. University of Utrecht; 2000.Google Scholar
- Wingender E, Dietze P, Karas H, Knüppel R: TRANSFAC: a database on transcription factors and their DNA binding sites. Nucleic Acids Res 1996, 24: 238–241. 10.1093/nar/24.1.238PubMed CentralView ArticlePubMedGoogle Scholar
- Ben-Gal I, Shani A, Gohr A, Grau A, Grau J, Arviv S, Shmilovici A, Posch S, Grosse I: Identification of transcription factor binding sites with variable-order Bayesian networks. Bioinformatics 2005, 21(11):2657–2666. 10.1093/bioinformatics/bti410View ArticlePubMedGoogle Scholar
- Frith MC, Hansen U, Spouge JL, Weng Z: Finding functional sequence elements by multiple local alignment. Nucleic Acids Res 2004, 32: 189–200. 10.1093/nar/gkh169PubMed CentralView ArticlePubMedGoogle Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.