Sciweavers

1993 search results - page 100 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
CEC
2007
IEEE
15 years 4 months ago
A rigorous view on neutrality
Abstract—Motivated by neutrality observed in natural evolution often redundant encodings are used in evolutionary algorithms. Many experimental studies have been carried out on t...
Benjamin Doerr, Michael Gnewuch, Nils Hebbinghaus,...
SMC
2007
IEEE
103views Control Systems» more  SMC 2007»
15 years 4 months ago
A new evaluation measure for information retrieval systems
Abstract— Some of the established approaches to evaluating text clustering algorithms for information retrieval show theoretical flaws. In this paper, we analyze these flaws an...
Martin Mehlitz, Christian Bauckhage, Jér&oc...
CSB
2005
IEEE
136views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Whole Genome Phylogeny Based on Clustered Signature String Composition
Peptide compositions constructed out of whole sets of protein sequences can be used as species signatures for phylogenetic analysis. To account for point mutations, an amino acid ...
Xiaomeng Wu, Guohui Lin, Xiu-Feng Wan, Dong Xu
ICDM
2008
IEEE
109views Data Mining» more  ICDM 2008»
15 years 4 months ago
Quantitative Association Analysis Using Tree Hierarchies
Association analysis arises in many important applications such as bioinformatics and business intelligence. Given a large collection of measurements over a set of samples, associ...
Feng Pan, Lynda Yang, Leonard McMillan, Fernando P...
EMSOFT
2004
Springer
15 years 3 months ago
Approximation of the worst-case execution time using structural analysis
We present a technique to approximate the worst-case execution time that combines structural analysis with a loop-bounding algorithm based on local induction variable analysis. St...
Matteo Corti, Thomas R. Gross