Sciweavers

1149 search results - page 230 / 230
» Comparing parameter tuning methods for evolutionary algorith...
Sort
View
PLDI
2009
ACM
14 years 1 days ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
ESWA
2007
176views more  ESWA 2007»
13 years 5 months ago
Credit scoring with a data mining approach based on support vector machines
The credit card industry has been growing rapidly recently, and thus huge numbers of consumers’ credit data are collected by the credit department of the bank. The credit scorin...
Cheng-Lung Huang, Mu-Chen Chen, Chieh-Jen Wang
SIAMIS
2010
176views more  SIAMIS 2010»
13 years 3 months ago
Optimized Conformal Surface Registration with Shape-based Landmark Matching
Surface registration, which transforms different sets of surface data into one common reference space, is an important process which allows us to compare or integrate the surface ...
Lok Ming Lui, Sheshadri R. Thiruvenkadam, Yalin Wa...
BMCBI
2006
155views more  BMCBI 2006»
13 years 5 months ago
AffyMiner: mining differentially expressed genes and biological knowledge in GeneChip microarray data
Background: DNA microarrays are a powerful tool for monitoring the expression of tens of thousands of genes simultaneously. With the advance of microarray technology, the challeng...
Guoqing Lu, The V. Nguyen, Yuannan Xia, Michael Fr...