Sciweavers

5387 search results - page 1061 / 1078
» Generating generic functions
Sort
View
BMCBI
2005
84views more  BMCBI 2005»
13 years 8 months ago
A note on generalized Genome Scan Meta-Analysis statistics
Background: Wise et al. introduced a rank-based statistical technique for meta-analysis of genome scans, the Genome Scan Meta-Analysis (GSMA) method. Levinson et al. recently desc...
James A. Koziol, Anne C. Feng
JAT
2007
55views more  JAT 2007»
13 years 8 months ago
The Homogeneous Approximation Property for wavelet frames
An irregular wavelet frame has the form W(ψ, Λ) = {a−1/2 ψ(x a − b)}(a,b)∈Λ, where ψ ∈ L2 (R) and Λ is an arbitrary sequence of points in the affine group A = R+ × ...
Christopher Heil, Gitta Kutyniok
JCNS
2007
89views more  JCNS 2007»
13 years 8 months ago
Synchronous and asynchronous bursting states: role of intrinsic neural dynamics
Brain signals such as local field potentials often display gamma-band oscillations (30–70 Hz) in a variety of cognitive tasks. These oscillatory activities possibly reflect sy...
Takashi Takekawa, Toshio Aoyagi, Tomoki Fukai
TOPLAS
2008
81views more  TOPLAS 2008»
13 years 8 months ago
Size-change termination with difference constraints
lem of inferring termination from such abstract information is not the halting problem for programs and may well be decidable. If this is the case, the decision algorithm forms a &...
Amir M. Ben-Amram
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
« Prev « First page 1061 / 1078 Last » Next »