Sciweavers

1809 search results - page 354 / 362
» Calculating Sized Types
Sort
View
MTA
2006
283views more  MTA 2006»
13 years 7 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
BMCBI
2005
124views more  BMCBI 2005»
13 years 7 months ago
Internet-based profiler system as integrative framework to support translational research
Background: Translational research requires taking basic science observations and developing them into clinically useful tests and therapeutics. We have developed a process to dev...
Robert Kim, Francesca Demichelis, Jeffery Tang, Al...
BMCBI
2005
93views more  BMCBI 2005»
13 years 7 months ago
Two-part permutation tests for DNA methylation and microarray data
Background: One important application of microarray experiments is to identify differentially expressed genes. Often, small and negative expression levels were clipped-off to be e...
Markus Neuhäuser, Tanja Boes, Karl-Heinz J&ou...
JGAA
2007
124views more  JGAA 2007»
13 years 7 months ago
Simultaneous Border Segmentation of Doughnut-Shaped Objects in Medical Images
Image segmentation with specific constraints has found applications in several areas such as biomedical image analysis and data mining. In this paper, we study the problem of sim...
Xiaodong Wu, Michael B. Merickel