Sciweavers

7623 search results - page 1360 / 1525
» Constructive Volume Modeling
Sort
View
108
Voted
ISCI
2007
135views more  ISCI 2007»
15 years 3 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
135
Voted
TDSC
2008
99views more  TDSC 2008»
15 years 3 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
128
Voted
TEC
2008
139views more  TEC 2008»
15 years 3 months ago
Genetic Programming Approaches for Solving Elliptic Partial Differential Equations
In this paper, we propose a technique based on genetic programming (GP) for meshfree solution of elliptic partial differential equations. We employ the least-squares collocation pr...
Andras Sobester, Prasanth B. Nair, Andy J. Keane
149
Voted
BIOINFORMATICS
2005
140views more  BIOINFORMATICS 2005»
15 years 3 months ago
Profile-based direct kernels for remote homology detection and fold recognition
Motivation: Remote homology detection between protein sequences is a central problem in computational biology. Supervised learning algorithms based on support vector machines are ...
Huzefa Rangwala, George Karypis
129
Voted
TKDE
2008
154views more  TKDE 2008»
15 years 3 months ago
Analyzing the Structure and Evolution of Massive Telecom Graphs
Abstract-- With ever growing competition in telecommunications markets, operators have to increasingly rely on business intelligence to offer the right incentives to their customer...
Amit Anil Nanavati, Rahul Singh, Dipanjan Chakrabo...
« Prev « First page 1360 / 1525 Last » Next »