Sciweavers

1541 search results - page 123 / 309
» Analysis of Random Noise and Random Walk Algorithms
Sort
View
155
Voted
BMCBI
2004
90views more  BMCBI 2004»
15 years 4 months ago
Statistical monitoring of weak spots for improvement of normalization and ratio estimates in microarrays
Background: Several aspects of microarray data analysis are dependent on identification of genes expressed at or near the limits of detection. For example, regression-based normal...
Igor Dozmorov, Nicholas Knowlton, Yuhong Tang, Mic...
BIOINFORMATICS
2008
172views more  BIOINFORMATICS 2008»
15 years 4 months ago
Fitting a geometric graph to a protein-protein interaction network
Motivation: Finding a good network null model for protein-protein interaction (PPI) networks is a fundamental issue. Such a model would provide insights into the interplay between...
Desmond J. Higham, Marija Rasajski, Natasa Przulj
GLOBECOM
2006
IEEE
15 years 10 months ago
Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks
Flooding and random walk (RW) are the two typical search algorithms in unstructured peer-to-peer networks. The flooding algorithm searches the network aggressively. It covers the m...
Po-Chiang Lin, Tsungnan Lin, Hsinping Wang
SIGGRAPH
1996
ACM
15 years 8 months ago
A Cellular Texture Basis Function
Solid texturing is a powerful way to add detail to the surface of rendered objects. Perlin's "noise" is a 3D basis function used in some of the most dramatic and us...
Steven Worley
ESORICS
2002
Springer
16 years 4 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski