Sciweavers

174 search results - page 35 / 35
» Permutation Groups in NC
Sort
View
TCSV
2008
156views more  TCSV 2008»
13 years 5 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
BMCBI
2005
114views more  BMCBI 2005»
13 years 5 months ago
Signal transduction pathway profiling of individual tumor samples
Background: Signal transduction pathways convey information from the outside of the cell to transcription factors, which in turn regulate gene expression. Our objective is to anal...
Thomas Breslin, Morten Krogh, Carsten Peterson, Ca...
EDM
2009
116views Data Mining» more  EDM 2009»
13 years 3 months ago
Determining the Significance of Item Order In Randomized Problem Sets
Researchers who make tutoring systems would like to know which sequences of educational content lead to the most effective learning by their students. The majority of data collecte...
Zachary A. Pardos, Neil T. Heffernan
IDA
2009
Springer
13 years 3 months ago
Hierarchical Extraction of Independent Subspaces of Unknown Dimensions
Abstract. Independent Subspace Analysis (ISA) is an extension of Independent Component Analysis (ICA) that aims to linearly transform a random vector such as to render groups of it...
Peter Gruber, Harold W. Gutch, Fabian J. Theis