Sciweavers

158 search results - page 32 / 32
» Analysis of improved signcryption scheme with key privacy
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 5 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
BMCBI
2007
97views more  BMCBI 2007»
13 years 5 months ago
SIRAC: Supervised Identification of Regions of Aberration in aCGH datasets
Background: Array comparative genome hybridization (aCGH) provides information about genomic aberrations. Alterations in the DNA copy number may cause the cell to malfunction, lea...
Carmen Lai, Hugo M. Horlings, Marc J. van de Vijve...
NAR
2006
79views more  NAR 2006»
13 years 5 months ago
The Database of Macromolecular Motions: new features added at the decade mark
The database of molecular motions, MolMovDB 15 (http://molmovdb.org), has been in existence for the past decade. It classifies macromolecular motions and provides tools to interpo...
Samuel Flores, Nathaniel Echols, Duncan Milburn, B...