Sciweavers

267 search results - page 51 / 54
» Signatures of Combinatorial Maps
Sort
View
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
13 years 11 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
BMCBI
2010
118views more  BMCBI 2010»
13 years 7 months ago
Predicting nucleosome positioning using a duration Hidden Markov Model
Background: The nucleosome is the fundamental packing unit of DNAs in eukaryotic cells. Its detailed positioning on the genome is closely related to chromosome functions. Increasi...
Liqun Xi, Yvonne Fondufe-Mittendorf, Lei Xia, Jare...
BMCBI
2010
141views more  BMCBI 2010»
13 years 7 months ago
Computing and visually analyzing mutual information in molecular co-evolution
Background: Selective pressure in molecular evolution leads to uneven distributions of amino acids and nucleotides. In fact one observes correlations among such constituents due t...
Sebastian Bremm, Tobias Schreck, Patrick Boba, Ste...
DKE
2007
107views more  DKE 2007»
13 years 7 months ago
A clustering method based on path similarities of XML data
Current studies on the storage of XML data are focused on either the efficient mapping of XML data onto an existing RDBMS or the development of a native XML storage. Some native X...
Il-Hwan Choi, Bongki Moon, Hyoung-Joo Kim
ENTCS
2007
168views more  ENTCS 2007»
13 years 7 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...