Sciweavers

9787 search results - page 1851 / 1958
» A Utile Function Optimizer
Sort
View
CCS
2010
ACM
13 years 8 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
SI3D
2010
ACM
13 years 8 months ago
Efficient irradiance normal mapping
Irradiance normal mapping is a method to combine two popular techniques, light mapping and normal mapping, and is used in games such as Half-Life 2 or Halo 3. This combination all...
Ralf Habel, Michael Wimmer
BMCBI
2008
177views more  BMCBI 2008»
13 years 8 months ago
Baseline Correction for NMR Spectroscopic Metabolomics Data Analysis
Background: We propose a statistically principled baseline correction method, derived from a parametric smoothing model. It uses a score function to describe the key features of b...
Yuanxin Xi, David M. Rocke
BMCBI
2008
144views more  BMCBI 2008»
13 years 8 months ago
Local conservation scores without a priori assumptions on neutral substitution rates
Background: Comparative genomics aims to detect signals of evolutionary conservation as an indicator of functional constraint. Surprisingly, results of the ENCODE project revealed...
Janis Dingel, Pavol Hanus, Niccolò Leonardi...
BMCBI
2007
130views more  BMCBI 2007»
13 years 8 months ago
HMM-ModE - Improved classification using profile hidden Markov models by optimising the discrimination threshold and modifying e
Background: Profile Hidden Markov Models (HMM) are statistical representations of protein families derived from patterns of sequence conservation in multiple alignments and have b...
Prashant K. Srivastava, Dhwani K. Desai, Soumyadee...
« Prev « First page 1851 / 1958 Last » Next »