Sciweavers

6960 search results - page 1219 / 1392
» Continuity Analysis of Programs
Sort
View
BMCBI
2006
128views more  BMCBI 2006»
15 years 3 months ago
Comparative assessment of performance and genome dependence among phylogenetic profiling methods
Background: The rapidly increasing speed with which genome sequence data can be generated will be accompanied by an exponential increase in the number of sequenced eukaryotes. Wit...
Evan S. Snitkin, Adam M. Gustafson, Joseph C. Mell...
CSDA
2006
169views more  CSDA 2006»
15 years 3 months ago
Generalized structured additive regression based on Bayesian P-splines
Generalized additive models (GAM) for modelling nonlinear effects of continuous covariates are now well established tools for the applied statistician. In this paper we develop Ba...
Andreas Brezger, Stefan Lang
COMCOM
2007
100views more  COMCOM 2007»
15 years 3 months ago
Sensor replacement using mobile robots
Sensor replacement is important for sensor networks to provide continuous sensing services. Upon sensor node failures, holes (uncovered areas) may appear in the sensing coverage. ...
Yongguo Mei, Changjiu Xian, Saumitra M. Das, Y. Ch...
ISI
2008
Springer
15 years 3 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
« Prev « First page 1219 / 1392 Last » Next »