Sciweavers

3830 search results - page 723 / 766
» From Reference Model to Component Model
Sort
View
CORR
2010
Springer
82views Education» more  CORR 2010»
15 years 1 months ago
Expansion and Search in Networks
Borrowing from concepts in expander graphs, we study the expansion properties of real-world, complex networks (e.g. social networks, unstructured peer-to-peer or P2P networks) and...
Arun S. Maiya, Tanya Y. Berger-Wolf
BMCBI
2006
82views more  BMCBI 2006»
15 years 1 months ago
Transcriptomic response to differentiation induction
Background: Microarrays used for gene expression studies yield large amounts of data. The processing of such data typically leads to lists of differentially-regulated genes. A com...
G. W. Patton, Robert M. Stephens, I. A. Sidorov, X...
CGF
2006
148views more  CGF 2006»
15 years 1 months ago
Analysis of Reproducing Real-World Appearance on Displays of Varying Dynamic Range
We conduct a series of experiments to investigate the desired properties of a tone mapping operator (TMO) and to design such an operator based on subjective data. We propose a nov...
Akiko Yoshida, Rafal Mantiuk, Karol Myszkowski, Ha...
IOR
2008
113views more  IOR 2008»
15 years 1 months ago
Service Competition with General Queueing Facilities
In many service industries, companies compete with each other on the basis of the waiting time their customers experience, along with the price they charge for their service. A fi...
Gad Allon, Awi Federgruen
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 1 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin