Sciweavers

355 search results - page 69 / 71
» Security Test Generation Using Threat Trees
Sort
View
SSWMC
2004
13 years 10 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
BMCBI
2006
104views more  BMCBI 2006»
13 years 8 months ago
MANET: tracing evolution of protein architecture in metabolic networks
Background: Cellular metabolism can be characterized by networks of enzymatic reactions and transport processes capable of supporting cellular life. Our aim is to find evolutionar...
Hee Shin Kim, Jay E. Mittenthal, Gustavo Caetano-A...
EMNLP
2010
13 years 6 months ago
Learning Recurrent Event Queries for Web Search
Recurrent event queries (REQ) constitute a special class of search queries occurring at regular, predictable time intervals. The freshness of documents ranked for such queries is ...
Ruiqiang Zhang, Yuki Konda, Anlei Dong, Pranam Kol...
ECCV
2008
Springer
14 years 6 months ago
Toward Global Minimum through Combined Local Minima
There are many local and greedy algorithms for energy minimization over Markov Random Field (MRF) such as iterated condition mode (ICM) and various gradient descent methods. Local ...
Ho Yub Jung, Kyoung Mu Lee, Sang Uk Lee
BIBM
2007
IEEE
132views Bioinformatics» more  BIBM 2007»
14 years 2 months ago
A Divide-and-Conquer Implementation of Three Sequence Alignment and Ancestor Inference
In this paper, we present an algorithm to simultaneously align three biological sequences with affine gap model and infer their common ancestral sequence. Our algorithm can be fu...
Feng Yue, Jijun Tang