Sciweavers

1814 search results - page 69 / 363
» Watermarking relational data: framework, algorithms and anal...
Sort
View
87
Voted
INFSOF
2002
78views more  INFSOF 2002»
15 years 11 days ago
Flow insensitive points-to sets
Pointer analysis is an important part of source code analysis. Many programs that manipulate source code take points-to sets as part of their input. Points-to related data collect...
Paul Anderson, David Binkley, Genevieve Rosay, Tim...
125
Voted
BMCBI
2007
149views more  BMCBI 2007»
15 years 25 days ago
A unified framework for finding differentially expressed genes from microarray experiments
Background: This paper presents a unified framework for finding differentially expressed genes (DEGs) from the microarray data. The proposed framework has three interrelated modul...
Jahangheer S. Shaik, Mohammed Yeasin
104
Voted
IADIS
2008
15 years 2 months ago
Towards A Model-Driven Engineering Approach of Data Mining
Nowadays, data mining is based on low-level speci cations of the employed techniques typically bounded to a speci c analysis platform. Therefore, data mining lacks a modelling arc...
Jesús Pardillo, José Jacobo Zubcoff,...
98
Voted
TCOM
2008
108views more  TCOM 2008»
15 years 18 days ago
Performance analysis on an MAP fine timing algorithm in UWB multiband OFDM
In this paper we develop a fine synchronization algorithm for multiband OFDM transmission in the presence of frequency selective channels. This algorithm is based on maximum a post...
Christian R. Berger, Shengli Zhou, Zhi Tian, Peter...

Lecture Notes
443views
16 years 10 months ago
Design and Analysis of Computer Algorithms
"This course will consist of a number of major sections. The first will be a short review of some preliminary material, including asymptotics, summations, and recurrences and ...
David M. Mount