Sciweavers

8294 search results - page 1653 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
77
Voted
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 2 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
CSB
2003
IEEE
15 years 2 months ago
LOGOS: a modular Bayesian model for de novo motif detection
The complexity of the global organization and internal structures of motifs in higher eukaryotic organisms raises significant challenges for motif detection techniques. To achiev...
Eric P. Xing, Wei Wu, Michael I. Jordan, Richard M...
WECWIS
2003
IEEE
102views ECommerce» more  WECWIS 2003»
15 years 2 months ago
FUSION: A System Allowing Dynamic Web Service Composition and Automatic Execution
Service portals are systems which expose a bundle of web services to the user, allowing the specification and subsequent execution of complex tasks defined over these individual...
Debra E. VanderMeer, Anindya Datta, Kaushik Dutta,...
ASM
2003
ASM
15 years 2 months ago
A Framework for Proving Contract-Equipped Classes
r in: Abstract State Machines 2003 — Advances in Theory and Applications, Proc. 10th International Workshop, Taormina, Italy, March 3-7, 2003, eds. Egon Boerger, Angelo Gargantin...
Bertrand Meyer
CLUSTER
2002
IEEE
15 years 2 months ago
Scalable Resource Management in High Performance Computers
Clusters of workstations have emerged as an important platform for building cost-effective, scalable, and highlyavailable computers. Although many hardware solutions are available...
Eitan Frachtenberg, Fabrizio Petrini, Juan Fern&aa...
« Prev « First page 1653 / 1659 Last » Next »