Sciweavers

2714 search results - page 537 / 543
» On the Notion of Value Object
Sort
View
MTA
2006
283views more  MTA 2006»
13 years 7 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
BMCBI
2005
114views more  BMCBI 2005»
13 years 7 months ago
Signal transduction pathway profiling of individual tumor samples
Background: Signal transduction pathways convey information from the outside of the cell to transcription factors, which in turn regulate gene expression. Our objective is to anal...
Thomas Breslin, Morten Krogh, Carsten Peterson, Ca...
CAD
2005
Springer
13 years 7 months ago
Optimizing the topological and combinatorial complexity of isosurfaces
Since the publication of the original Marching Cubes algorithm, numerous variations have been proposed for guaranteeing water-tight constructions of triangulated approximations of...
Carlos Andújar, Pere Brunet, Antoni Chica, ...
AAMAS
2004
Springer
13 years 7 months ago
A Manifesto for Agent Technology: Towards Next Generation Computing
The European Commission's eEurope initiative aims to bring every citizen, home, school, business and administration online to create a digitally literate Europe. The value lie...
Michael Luck, Peter McBurney, Chris Preist
BMCBI
2004
158views more  BMCBI 2004»
13 years 7 months ago
Incremental genetic K-means algorithm and its application in gene expression data analysis
Background: In recent years, clustering algorithms have been effectively applied in molecular biology for gene expression data analysis. With the help of clustering algorithms suc...
Yi Lu, Shiyong Lu, Farshad Fotouhi, Youping Deng, ...