Sciweavers

257 search results - page 22 / 52
» Breaking Robert's Rules
Sort
View
77
Voted
CSB
2005
IEEE
140views Bioinformatics» more  CSB 2005»
15 years 5 months ago
TPR Packing Analysis and 3D Modeling for the HAT Domain of Human Crooked Neck Protein
Human crooked neck protein (hcrn) containing 17 HAT or TPR repeats plays a role in pre-mRNA processing. Conserved residues in the TPR consensus sequence of 34 aa were found at hel...
Zhenglin Hou, Cunxi Wang, Odd-Arne Olsen
NETWORKING
2007
15 years 1 months ago
Peer-Assisted On-Demand Streaming of Stored Media Using BitTorrent-Like Protocols
With BitTorrent-like protocols a client may download a file from a large and changing set of peers, using connections of heterogeneous and timevarying bandwidths. This flexibility ...
Niklas Carlsson, Derek L. Eager
JCS
2008
93views more  JCS 2008»
14 years 12 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JISE
2008
108views more  JISE 2008»
14 years 12 months ago
Efficient Discovery of Frequent Continuities by Projected Window List Technology
Mining frequent patterns in databases is a fundamental and essential problem in data mining research. A continuity is a kind of causal relationship which describes a definite temp...
Kuo-Yu Huang, Chia-Hui Chang, Kuo-Zui Lin
TASLP
2002
87views more  TASLP 2002»
14 years 11 months ago
A set of corpus-based text-to-speech synthesis technologies for Mandarin Chinese
This paper presents a set of corpus-based text-to-speech synthesis technologies for Mandarin Chinese. A large speech corpus produced by a single speaker is used, and the speech out...
Fu-Chiang Chou, Chiu-yu Tseng, Lin-Shan Lee