Sciweavers

2905 search results - page 235 / 581
» Formal Memetic Algorithms
Sort
View
82
Voted
CASES
2007
ACM
15 years 2 months ago
Stack size reduction of recursive programs
For memory constrained environments like embedded systems, optimization for program size is often as important, if not more important, as optimization for execution speed. Commonl...
Stefan Schäckeler, Weijia Shang
90
Voted
SWAP
2007
15 years 3 days ago
Reasoning with Instances of Heterogeneous Ontologies
We address the problem of reasoning with instances of heterogeneously formalized ontologies. Given a set of semantic mappings, reconciling conceptual and instance level heterogenei...
Luciano Serafini, Andrei Tamilin
99
Voted
BMCBI
2007
166views more  BMCBI 2007»
14 years 11 months ago
How to decide which are the most pertinent overly-represented features during gene set enrichment analysis
Background: The search for enriched features has become widely used to characterize a set of genes or proteins. A key aspect of this technique is its ability to identify correlati...
Roland Barriot, David J. Sherman, Isabelle Dutour
125
Voted
RV
2010
Springer
220views Hardware» more  RV 2010»
14 years 8 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu
212
Voted
POPL
2006
ACM
15 years 11 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann