Sciweavers

909 search results - page 163 / 182
» Reversible data hiding
Sort
View
NSPW
2003
ACM
14 years 29 days ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CPM
2000
Springer
141views Combinatorics» more  CPM 2000»
13 years 11 months ago
A Lower Bound for the Breakpoint Phylogeny Problem
Breakpoint phylogenies methods have been shown to be an effective way to extract phylogenetic information from gene order data. Currently, the only practical breakpoint phylogeny a...
David Bryant
ETVC
2008
13 years 9 months ago
Abstracts of the LIX Fall Colloquium 2008: Emerging Trends in Visual Computing
s of the LIX Fall Colloquium 2008: Emerging Trends in Visual Computing Frank Nielsen Ecole Polytechnique, Palaiseau, France Sony CSL, Tokyo, Japan Abstract. We list the abstracts o...
Frank Nielsen
BMCBI
2006
93views more  BMCBI 2006»
13 years 7 months ago
Evaluation of absolute quantitation by nonlinear regression in probe-based real-time PCR
Background: In real-time PCR data analysis, the cycle threshold (CT) method is currently the gold standard. This method is based on an assumption of equal PCR efficiency in all re...
Rasmus Goll, Trine Olsen, Guanglin Cui, Jon Florho...
BMCBI
2006
179views more  BMCBI 2006»
13 years 7 months ago
Accurate and unambiguous tag-to-gene mapping in serial analysis of gene expression
Background: In this study, we present a robust and reliable computational method for tag-togene assignment in serial analysis of gene expression (SAGE). The method relies on curre...
Rodrigo Malig, Cristian Varela, Eduardo Agosin, Fr...