Sciweavers

8655 search results - page 1319 / 1731
» Challenges for Trusted Computing
Sort
View
CIBCB
2005
IEEE
15 years 9 months ago
Two-Phase EA/k-NN for Feature Selection and Classification in Cancer Microarray Datasets
Efficient and reliable methods that can find a small sample of informative genes amongst thousands are of great importance. In this area, much research is investigating the combina...
Thorhildur Juliusdottir, David Corne, Ed Keedwell,...
CRV
2005
IEEE
191views Robotics» more  CRV 2005»
15 years 9 months ago
Automated Behavioral Phenotype Detection and Analysis Using Color-Based Motion Tracking
The problem of elucidating the functional significance of genes is a key challenge of modern science. Solving this problem can lead to fundamental advancements across multiple are...
Alan Shimoide, Ilmi Yoon, Megumi Fuse, Holly C. Be...
DATE
2005
IEEE
153views Hardware» more  DATE 2005»
15 years 9 months ago
Accurate Reliability Evaluation and Enhancement via Probabilistic Transfer Matrices
Soft errors are an increasingly serious problem for logic circuits. To estimate the effects of soft errors on such circuits, we develop a general computational framework based on ...
Smita Krishnaswamy, George F. Viamontes, Igor L. M...
DATE
2005
IEEE
158views Hardware» more  DATE 2005»
15 years 9 months ago
Scheduling of Soft Real-Time Systems for Context-Aware Applications
Context-aware applications pose new challenges, including a need for new computational models, uncertainty management, and efficient optimization under uncertainty. Uncertainty c...
Jennifer L. Wong, Weiping Liao, Fei Li, Lei He, Mi...
EDOC
2005
IEEE
15 years 9 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
« Prev « First page 1319 / 1731 Last » Next »