Sciweavers

4615 search results - page 359 / 923
» A Data Analysis Method for Software Performance Prediction
Sort
View
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 10 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
BMCBI
2006
131views more  BMCBI 2006»
15 years 4 months ago
The statistics of identifying differentially expressed genes in Expresso and TM4: a comparison
Background: Analysis of DNA microarray data takes as input spot intensity measurements from scanner software and returns differential expression of genes between two conditions, t...
Allan A. Sioson, Shrinivasrao P. Mane, Pinghua Li,...
CORR
2010
Springer
134views Education» more  CORR 2010»
15 years 4 months ago
Effective Defect Prevention Approach in Software Process for Achieving Better Quality Levels
Defect prevention is the most vital but habitually neglected facet of software quality assurance in any project. If functional at all stages of software development, it can condens...
V. Suma, T. R. Gopalakrishnan Nair
CODES
2006
IEEE
15 years 10 months ago
A buffer-sizing algorithm for networks on chip using TDMA and credit-based end-to-end flow control
When designing a System-on-Chip (SoC) using a Networkon-Chip (NoC), silicon area and power consumption are two key elements to optimize. A dominant part of the NoC area and power ...
Martijn Coenen, Srinivasan Murali, Andrei Radulesc...
CSDA
2008
86views more  CSDA 2008»
15 years 4 months ago
Transformations for semi-continuous data
Semi-continuous data arise in many applications where naturally-continuous data become contaminated by the data generating mechanism. The resulting data contain several values tha...
Galit Shmueli, Wolfgang Jank, Valerie Hyde