Sciweavers

4539 search results - page 765 / 908
» Approaches to Compute Workflow Complexity
Sort
View
120
Voted
GECCO
2004
Springer
138views Optimization» more  GECCO 2004»
15 years 10 months ago
Exploratory Data Analysis with Interactive Evolution
We illustrate with two simple examples how Interactive Evolutionary Computation (IEC) can be applied to Exploratory Data Analysis (EDA). IEC is particularly valuable in an EDA cont...
Sergey Malinchik, Eric Bonabeau
GECCO
2004
Springer
169views Optimization» more  GECCO 2004»
15 years 10 months ago
Genetic Programming Neural Networks as a Bioinformatics Tool for Human Genetics
The identification of genes that influence the risk of common, complex diseases primarily through interactions with other genes and environmental factors remains a statistical and ...
Marylyn D. Ritchie, Christopher S. Coffey, Jason H...
185
Voted
ISW
2004
Springer
15 years 10 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
LCPC
2004
Springer
15 years 10 months ago
HiLO: High Level Optimization of FFTs
As computing platforms become more and more complex, the task of optimizing performance critical codes becomes more challenging. Recently, more attention has been focused on automa...
Nick Rizzolo, David A. Padua
MIDDLEWARE
2004
Springer
15 years 10 months ago
On adaptable middleware product lines
Middleware helps to manage the complexity and heterogeneity inherent in distributed systems. Traditional middleware has a monolithic architecture, which makes it difficult to adap...
Wasif Gilani, Nabeel Hasan Naqvi, Olaf Spinczyk