Sciweavers

1486 search results - page 109 / 298
» Firewall Rules Analysis
Sort
View
PLDI
2003
ACM
15 years 9 months ago
A compiler framework for speculative analysis and optimizations
Speculative execution, such as control speculation and data speculation, is an effective way to improve program performance. Using edge/path profile information or simple heuristi...
Jin Lin, Tong Chen, Wei-Chung Hsu, Pen-Chung Yew, ...
BMCBI
2008
173views more  BMCBI 2008»
15 years 4 months ago
Improved machine learning method for analysis of gas phase chemistry of peptides
Background: Accurate peptide identification is important to high-throughput proteomics analyses that use mass spectrometry. Search programs compare fragmentation spectra (MS/MS) o...
Allison Gehrke, Shaojun Sun, Lukasz A. Kurgan, Nat...
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 1 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
ISIPTA
2005
IEEE
155views Mathematics» more  ISIPTA 2005»
15 years 9 months ago
Estimation of Chaotic Probabilities
A Chaotic Probability model is a usual set of probability measures, M, the totality of which is endowed with an objective, frequentist interpretation as opposed to being viewed as...
Leandro Chaves Rêgo, Terrence L. Fine
AAIM
2005
Springer
110views Algorithms» more  AAIM 2005»
15 years 9 months ago
Dynamically Updating the Exploiting Parameter in Improving Performance of Ant-Based Algorithms
Abstract. The utilization of pseudo-random proportional rule to balance between the exploitation and exploration of the search process was shown in Ant Colony System (ACS) algorith...
Hoang Trung Dinh, Abdullah Al Mamun, Hieu T. Dinh