Sciweavers

856 search results - page 167 / 172
» An Adaptive Steganographic Method Using Additive Noise
Sort
View
BMCBI
2005
94views more  BMCBI 2005»
15 years 5 months ago
Visualization-based discovery and analysis of genomic aberrations in microarray data
Background: Chromosomal copy number changes (aneuploidies) play a key role in cancer progression and molecular evolution. These copy number changes can be studied using microarray...
Chad L. Myers, Xing Chen, Olga G. Troyanskaya
AAAI
2010
15 years 4 months ago
A Trust Model for Supply Chain Management
hey generalize these factors to the abstract concepts of ability, integrity, and benevolence. This model does not use probabilistic decision theory. Other SCM trust factors have be...
Yasaman Haghpanah, Marie desJardins
DLOG
2010
15 years 3 months ago
Optimizing Algebraic Tableau Reasoning for SHOQ: First Experimental Results
In this paper we outline an algebraic tableau algorithm for the DL SHOQ, which supports more informed reasoning due to the use of semantic partitioning and integer programming. We ...
Jocelyne Faddoul, Volker Haarslev
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
15 years 10 months ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
KDD
2008
ACM
181views Data Mining» more  KDD 2008»
16 years 5 months ago
Learning subspace kernels for classification
Kernel methods have been applied successfully in many data mining tasks. Subspace kernel learning was recently proposed to discover an effective low-dimensional subspace of a kern...
Jianhui Chen, Shuiwang Ji, Betul Ceran, Qi Li, Min...