Sciweavers

1532 search results - page 261 / 307
» A Comparison of RESTART Implementations
Sort
View
BMCBI
2008
153views more  BMCBI 2008»
14 years 10 months ago
Version VI of the ESTree db: an improved tool for peach transcriptome analysis
Background: The ESTree database (db) is a collection of Prunus persica and Prunus dulcis EST sequences that in its current version encompasses 75,404 sequences from 3 almond and 1...
Barbara Lazzari, Andrea Caprera, Alberto Vecchiett...
FUIN
2008
99views more  FUIN 2008»
14 years 9 months ago
Universality Analysis for One-Clock Timed Automata
This paper is concerned with the universality problem for timed automata: given a timed automaton A, does A accept all timed words? Alur and Dill have shown that the universality p...
Parosh Aziz Abdulla, Johann Deneux, Joël Ouak...
BMCBI
2006
202views more  BMCBI 2006»
14 years 9 months ago
Spectral embedding finds meaningful (relevant) structure in image and microarray data
Background: Accurate methods for extraction of meaningful patterns in high dimensional data have become increasingly important with the recent generation of data types containing ...
Brandon W. Higgs, Jennifer W. Weller, Jeffrey L. S...
BMCBI
2006
146views more  BMCBI 2006»
14 years 9 months ago
Optimized Particle Swarm Optimization (OPSO) and its application to artificial neural network training
Background: Particle Swarm Optimization (PSO) is an established method for parameter optimization. It represents a population-based adaptive optimization technique that is influen...
Michael Meissner, Michael Schmuker, Gisbert Schnei...
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi