Sciweavers

236 search results - page 32 / 48
» From Weak to Strong Watermarking
Sort
View
BIRD
2007
Springer
150views Bioinformatics» more  BIRD 2007»
14 years 4 months ago
Bayesian Inference for 2D Gel Electrophoresis Image Analysis
Two-dimensional gel electrophoresis (2DGE) is a technique to separate individual proteins in biological samples. The 2DGE technique results in gel images where proteins appear as d...
Ji Won Yoon, Simon J. Godsill, ChulHun Kang, Tae-S...
JOCN
2010
81views more  JOCN 2010»
13 years 8 months ago
Item Retrieval and Competition in Noun and Verb Generation: An fMRI Study
■ Selection between competing responses and stimulus-response association strength is thought to affect performance during verb generation. However, the specific contribution of...
Cristiano Crescentini, Tim Shallice, Emiliano Maca...
IPL
2006
110views more  IPL 2006»
13 years 9 months ago
Variationally universal hashing
The strongest well-known measure for the quality of a universal hash-function family H is its being -strongly universal, which measures, for randomly chosen h H, one's inabi...
Ted Krovetz, Phillip Rogaway
HPCA
2004
IEEE
14 years 10 months ago
Perceptron-Based Branch Confidence Estimation
Pipeline gating has been proposed for reducing wasted speculative execution due to branch mispredictions. As processors become deeper or wider, pipeline gating becomes more import...
Haitham Akkary, Srikanth T. Srinivasan, Rajendar K...
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
14 years 10 months ago
Detecting and resolving unsound workflow views for correct provenance analysis
views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is careful...
Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen