Sciweavers

10396 search results - page 1939 / 2080
» Deployment Support Network
Sort
View
GECCO
2008
Springer
172views Optimization» more  GECCO 2008»
14 years 11 months ago
Empirical analysis of a genetic algorithm-based stress test technique
Evolutionary testing denotes the use of evolutionary algorithms, e.g., Genetic Algorithms (GAs), to support various test automation tasks. Since evolutionary algorithms are heuris...
Vahid Garousi
94
Voted
HPDC
2008
IEEE
14 years 10 months ago
Eliminating the middleman: peer-to-peer dataflow
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflo...
Adam Barker, Jon B. Weissman, Jano I. van Hemert
ADT
2010
14 years 10 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
BMCBI
2008
123views more  BMCBI 2008»
14 years 10 months ago
Pol II promoter prediction using characteristic 4-mer motifs: a machine learning approach
Background: Eukaryotic promoter prediction using computational analysis techniques is one of the most difficult jobs in computational genomics that is essential for constructing a...
Firoz Anwar, Syed Murtuza Baker, Taskeed Jabid, Md...
87
Voted
CORR
2010
Springer
198views Education» more  CORR 2010»
14 years 10 months ago
Downlink Interference Alignment
We develop an interference alignment (IA) technique for a downlink cellular system. In the uplink, IA schemes need channel-state-information exchange across base-stations of diffe...
Changho Suh, Minnie Ho, David Tse
« Prev « First page 1939 / 2080 Last » Next »