Sciweavers

252 search results - page 45 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
RTA
1993
Springer
13 years 11 months ago
Redundancy Criteria for Constrained Completion
This paper studies completion in the case of equations with constraints consisting of rstorder formulae over equations, disequations, and an irreducibility predicate. We present s...
Christopher Lynch, Wayne Snyder
EUROSSC
2008
Springer
13 years 9 months ago
Gaussian Process Person Identifier Based on Simple Floor Sensors
Abstract. This paper describes methods and sensor technology used to identify persons from their walking characteristics. We use an array of simple binary switch floor sensors to d...
Jaakko Suutala, Kaori Fujinami, Juha Röning
JAIR
2006
141views more  JAIR 2006»
13 years 7 months ago
An Approach to Temporal Planning and Scheduling in Domains with Predictable Exogenous Events
The treatment of exogenous events in planning is practically important in many realworld domains where the preconditions of certain plan actions are affected by such events. In th...
Alfonso Gerevini, Alessandro Saetti, Ivan Serina
TSP
2010
13 years 2 months ago
Covariance estimation in decomposable Gaussian graphical models
Graphical models are a framework for representing and exploiting prior conditional independence structures within distributions using graphs. In the Gaussian case, these models are...
Ami Wiesel, Yonina C. Eldar, Alfred O. Hero
BMCBI
2008
136views more  BMCBI 2008»
13 years 7 months ago
An efficient method for the prediction of deleterious multiple-point mutations in the secondary structure of RNAs using suboptim
Background: RNAmute is an interactive Java application which, given an RNA sequence, calculates the secondary structure of all single point mutations and organizes them into categ...
Alexander Churkin, Danny Barash