Sciweavers

2061 search results - page 363 / 413
» Authorization for Metacomputing Applications
Sort
View
CCS
2007
ACM
15 years 6 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
COCOA
2007
Springer
15 years 6 months ago
On the Complexity of Some Colorful Problems Parameterized by Treewidth
Abstract. We study the complexity of several coloring problems on graphs, parameterized by the treewidth t of the graph: (1) The list chromatic number χl(G) of a graph G is defin...
Michael R. Fellows, Fedor V. Fomin, Daniel Lokshta...
131
Voted
GECCO
2007
Springer
197views Optimization» more  GECCO 2007»
15 years 6 months ago
Computational intelligence techniques: a study of scleroderma skin disease
This paper presents an analysis of microarray gene expression data from patients with and without scleroderma skin disease using computational intelligence and visual data mining ...
Julio J. Valdés, Alan J. Barton
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
15 years 6 months ago
Exploring medical data using visual spaces with genetic programming and implicit functional mappings
Two medical data sets (Breast cancer and Colon cancer) are investigated within a visual data mining paradigm through the unsupervised construction of virtual reality spaces using ...
Julio J. Valdés, Robert Orchard, Alan J. Ba...
130
Voted
ICN
2007
Springer
15 years 6 months ago
Toward Broad-Spectrum Autonomic Management
— The fields of autonomics and system configuration share a common goal in decreasing the cost of ownership of large fabrics. In this paper we present a combined vision in whic...
Edmund Smith, Paul Anderson