Sciweavers

236 search results - page 44 / 48
» From Weak to Strong Watermarking
Sort
View
BMCBI
2004
161views more  BMCBI 2004»
13 years 9 months ago
Three-parameter lognormal distribution ubiquitously found in cDNA microarray data and its application to parametric data treatme
Background: To cancel experimental variations, microarray data must be normalized prior to analysis. Where an appropriate model for statistical data distribution is available, a p...
Tomokazu Konishi
JSYML
2000
103views more  JSYML 2000»
13 years 9 months ago
A Model Complete Theory of Valued D-Fields
The notion of a D-ring, generalizing that of a differential or a difference ring, is introduced. Quantifier elimination and a version of the AxKochen-Ershov principle is proven for...
Thomas Scanlon
STOC
2010
ACM
200views Algorithms» more  STOC 2010»
14 years 7 months ago
Hardness Amplification in Proof Complexity
We present a generic method for converting any family of unsatisfiable CNF formulas that require large resolution rank into CNF formulas whose refutation requires large rank for p...
Paul Beame, Trinh Huynh and Toniann Pitassi
ICC
2007
IEEE
214views Communications» more  ICC 2007»
14 years 4 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
INFOCOM
2005
IEEE
14 years 3 months ago
RID: radio interference detection in wireless sensor networks
— In wireless sensor networks, many protocols assume that if node A is able to interfere with node B’s packet reception, then node B is within node A’s communication range. I...
Gang Zhou, Tian He, John A. Stankovic, Tarek F. Ab...