Sciweavers

872 search results - page 118 / 175
» Sketch-based change detection: methods, evaluation, and appl...
Sort
View
BMCBI
2005
107views more  BMCBI 2005»
13 years 7 months ago
A stepwise framework for the normalization of array CGH data
Background: In two-channel competitive genomic hybridization microarray experiments, the ratio of the two fluorescent signal intensities at each spot on the microarray is commonly...
Mehrnoush Khojasteh, Wan L. Lam, Rabab Kreidieh Wa...
ICDE
2000
IEEE
174views Database» more  ICDE 2000»
14 years 9 months ago
Self-Adaptive User Profiles for Large-Scale Data Delivery
Push-based data delivery requires knowledge of user interests for making scheduling, bandwidthallocation, and routing decisions. Such information is maintained as user profiles. W...
C. Lee Giles, Michael J. Franklin, Ugur Çet...
ICIP
2005
IEEE
14 years 9 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 5 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
CLUSTER
2002
IEEE
13 years 7 months ago
Location Selection for Active Services
Active services are application-specified programs that are executed inside the network. The location where the active service is executed plays an important role. The dynamic beha...
Roger Karrer, Thomas R. Gross