Sciweavers

1067 search results - page 61 / 214
» Analysis of BPEL Data Dependencies
Sort
View
140
Voted
BMCBI
2008
159views more  BMCBI 2008»
15 years 19 days ago
Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments
Background: Identification of differentially expressed genes is a typical objective when analyzing gene expression data. Recently, Bayesian hierarchical models have become increas...
Hongya Zhao, Kwok-Leung Chan, Lee-Ming Cheng, Hong...
BMCBI
2004
169views more  BMCBI 2004»
15 years 11 days ago
A power law global error model for the identification of differentially expressed genes in microarray data
Background: High-density oligonucleotide microarray technology enables the discovery of genes that are transcriptionally modulated in different biological samples due to physiolog...
Norman Pavelka, Mattia Pelizzola, Caterina Vizzard...
DRM
2003
Springer
15 years 5 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
VLSID
2008
IEEE
151views VLSI» more  VLSID 2008»
16 years 27 days ago
Predictable Implementation of Real-Time Applications on Multiprocessor Systems-on-Chip
Worst-case execution time (WCET) analysis and, in general, the predictability of real-time applications implemented on multiprocessor systems has been addressed only in very restri...
Alexandru Andrei, Petru Eles, Zebo Peng, Jakob Ros...
134
Voted
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 6 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...