Sciweavers

18374 search results - page 3675 / 3675
» Applications for data hiding
Sort
View
TRECVID
2007
13 years 7 months ago
Determination of Shot Boundary in MPEG Videos for TRECVID 2007
TURED ABSTRACT Detection of shot boundary plays important roles in many video applications. Herein, a novel method on shot boundary detection from compressed video is proposed. Fir...
Jinchang Ren, Jianmin Jiang, Juan Chen
BMCBI
2008
139views more  BMCBI 2008»
13 years 5 months ago
A topological transformation in evolutionary tree search methods based on maximum likelihood combining p-ECR and neighbor joinin
Background: Inference of evolutionary trees using the maximum likelihood principle is NP-hard. Therefore, all practical methods rely on heuristics. The topological transformations...
Maozu Guo, Jian-Fu Li, Yang Liu
NETWORK
2008
150views more  NETWORK 2008»
13 years 5 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
BMCBI
2011
13 years 23 days ago
RedundancyMiner: De-replication of redundant GO categories in microarray and proteomics analysis
Background: The Gene Ontology (GO) Consortium organizes genes into hierarchical categories based on biological process, molecular function and subcellular localization. Tools such...
Barry Zeeberg, Hongfang Liu, Ari B. Kahn, Martin E...
« Prev « First page 3675 / 3675 Last » Next »