Sciweavers

449 search results - page 76 / 90
» On a Quantitative Measure for Modularity Based on Informatio...
Sort
View
DRM
2007
Springer
14 years 2 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
MM
2006
ACM
175views Multimedia» more  MM 2006»
14 years 1 months ago
Diversifying the image retrieval results
In the area of image retrieval, post-retrieval processing is often used to refine the retrieval results to better satisfy users’ requirements. Previous methods mainly focus on p...
Kai Song, YongHong Tian, Wen Gao, Tiejun Huang
BIRTHDAY
2010
Springer
14 years 23 days ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem
BMCBI
2007
139views more  BMCBI 2007»
13 years 8 months ago
Improving model predictions for RNA interference activities that use support vector machine regression by combining and filterin
Background: RNA interference (RNAi) is a naturally occurring phenomenon that results in the suppression of a target RNA sequence utilizing a variety of possible methods and pathwa...
Andrew S. Peek
BMCBI
2010
160views more  BMCBI 2010»
13 years 8 months ago
Identification of functional hubs and modules by converting interactome networks into hierarchical ordering of proteins
Background: Protein-protein interactions play a key role in biological processes of proteins within a cell. Recent high-throughput techniques have generated protein-protein intera...
Young-Rae Cho, Aidong Zhang