Sciweavers

1275 search results - page 254 / 255
» The Infinite Hidden Markov Model
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 5 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
IPM
2007
143views more  IPM 2007»
13 years 5 months ago
QCS: A system for querying, clustering and summarizing documents
Information retrieval systems consist of many complicated components. Research and development of such systems is often hampered by the difficulty in evaluating how each particula...
Daniel M. Dunlavy, Dianne P. O'Leary, John M. Conr...
BMCBI
2005
302views more  BMCBI 2005»
13 years 5 months ago
CGHPRO - A comprehensive data analysis tool for array CGH
Background: Array CGH (Comparative Genomic Hybridisation) is a molecular cytogenetic technique for the genome wide detection of chromosomal imbalances. It is based on the cohybrid...
Wei Chen, Fikret Erdogan, H.-Hilger Ropers, Steffe...
BMCBI
2004
111views more  BMCBI 2004»
13 years 5 months ago
The Hotdog fold: wrapping up a superfamily of thioesterases and dehydratases
Background: The Hotdog fold was initially identified in the structure of Escherichia coli FabA and subsequently in 4-hydroxybenzoyl-CoA thioesterase from Pseudomonas sp. strain CB...
Shane C. Dillon, Alex Bateman
NAR
2007
132views more  NAR 2007»
13 years 5 months ago
Expanded protein information at SGD: new pages and proteome browser
The recent explosion in protein data generated from both directed small-scale studies and largescale proteomics efforts has greatly expanded the quantity of available protein info...
Robert S. Nash, Shuai Weng, Benjamin C. Hitz, Rama...