Sciweavers

1486 search results - page 251 / 298
» Firewall Rules Analysis
Sort
View
KDD
1994
ACM
113views Data Mining» more  KDD 1994»
15 years 3 months ago
Exploration of Simulation Experiments by Discovery
: Weexemplify in this paper, howa discovery system is applied to the analysis of simulation experimentsin practical political planning, andshowwhatkind of newknowledgecan be discov...
Willi Klösgen
CEC
2007
IEEE
15 years 3 months ago
Development and validation of different hybridization strategies between GA and PSO
In this paper a new class of hybridization strategies between GA and PSO is presented and validated. The Genetical Swarm Optimization (GSO) approach is presented here with respect ...
A. Gandelli, F. Grimaccia, Marco Mussetta, Paola P...
ACMSE
2007
ACM
15 years 3 months ago
Change propagations in the maintenance of kernel-based software with a study on Linux
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
Liguo Yu, Srini Ramaswamy
CISIM
2007
IEEE
15 years 3 months ago
Semi-Automatic Segmentation of Fibrous Liver Tissue
This article presents a semi-automatic segmentation of the fibrous liver tissue in the in-vivo liver biopsy color images. The segmentation is performed using a tree-based classifi...
P. Andruszkiewicz, C. Boldak, J. Jaroszewicz
DAC
2007
ACM
15 years 3 months ago
Synthetic biology: from bacteria to stem cells
Synthetic biology is revolutionizing how we conceptualize and approach the engineering of biological systems. Recent advances in the field are allowing us to expand beyond the con...
Ron Weiss