Sciweavers

1050 search results - page 152 / 210
» Two methods of authenticated positioning
Sort
View
BMCBI
2008
108views more  BMCBI 2008»
15 years 1 months ago
A nonparametric model for quality control of database search results in shotgun proteomics
Background: Analysis of complex samples with tandem mass spectrometry (MS/MS) has become routine in proteomic research. However, validation of database search results creates a bo...
Jiyang Zhang, Jianqi Li, Xin Liu, Hongwei Xie, Yun...
CIKM
2009
Springer
15 years 8 months ago
Generating comparative summaries of contradictory opinions in text
This paper presents a study of a novel summarization problem called contrastive opinion summarization (COS). Given two sets of positively and negatively opinionated sentences whic...
Hyun Duk Kim, ChengXiang Zhai
88
Voted
BMCBI
2008
112views more  BMCBI 2008»
15 years 1 months ago
Normalization for triple-target microarray experiments
Background: Most microarray studies are made using labelling with one or two dyes which allows the hybridization of one or two samples on the same slide. In such experiments, the ...
Marie-Laure Martin-Magniette, Julie Aubert, Avner ...
TIFS
2008
200views more  TIFS 2008»
15 years 1 months ago
Color Image Watermarking Using Multidimensional Fourier Transforms
This paper presents two vector watermarking schemes that are based on the use of complex and quaternion Fourier transforms and demonstrates, for the first time, how to embed waterm...
Tsz Kin Tsui, Xiao-Ping Zhang, Dimitrios Androutso...
INFOCOM
2007
IEEE
15 years 8 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin