Sciweavers

105 search results - page 21 / 21
» Permutation statistics on involutions
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 5 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
TCSV
2008
156views more  TCSV 2008»
13 years 5 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
BIOINFORMATICS
2005
151views more  BIOINFORMATICS 2005»
13 years 5 months ago
Differential and trajectory methods for time course gene expression data
Motivation: The issue of high dimensionality in microarray data has been, and remains, a hot topic in statistical and computational analysis. Efficient gene filtering and differen...
Yulan Liang, Bamidele Tayo, Xueya Cai, Arpad Kelem...
BMCBI
2005
114views more  BMCBI 2005»
13 years 5 months ago
Signal transduction pathway profiling of individual tumor samples
Background: Signal transduction pathways convey information from the outside of the cell to transcription factors, which in turn regulate gene expression. Our objective is to anal...
Thomas Breslin, Morten Krogh, Carsten Peterson, Ca...
BMCBI
2004
146views more  BMCBI 2004»
13 years 5 months ago
Multivariate search for differentially expressed gene combinations
Background: To identify differentially expressed genes, it is standard practice to test a twosample hypothesis for each gene with a proper adjustment for multiple testing. Such te...
Yuanhui Xiao, Robert D. Frisina, Alexander Gordon,...