Sciweavers

2157 search results - page 368 / 432
» Binary ant algorithm
Sort
View
IMC
2006
ACM
15 years 5 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
ARITH
2005
IEEE
15 years 5 months ago
Table Lookup Structures for Multiplicative Inverses Modulo 2k
We introduce an inheritance property and related table lookup structures applicable to simplified evaluation of the modular operations “multiplicative inverse”, “discrete l...
David W. Matula, Alex Fit-Florea, Mitchell Aaron T...
CEC
2005
IEEE
15 years 5 months ago
A quantitative approach for validating the building-block hypothesis
The building blocks are common structures of high-quality solutions. Genetic algorithms often assume the building-block hypothesis. It is hypothesized that the high-quality solutio...
Chatchawit Aporntewan, Prabhas Chongstitvatana
CSB
2005
IEEE
125views Bioinformatics» more  CSB 2005»
15 years 5 months ago
Peptide Charge State Determination for Low-Resolution Tandem Mass Spectra
Mass spectrometry is a particularly useful technology for the rapid and robust identification of peptides and proteins in complex mixtures. Peptide sequences can be identified b...
Aaron A. Klammer, Christine C. Wu, Michael J. MacC...
PDP
2005
IEEE
15 years 5 months ago
Memory Bandwidth Aware Scheduling for SMP Cluster Nodes
Clusters of SMPs are becoming increasingly common. However, the shared memory design of SMPs and the consequential contention between system processors for access to main memory c...
Evangelos Koukis, Nectarios Koziris