Sciweavers

1448 search results - page 230 / 290
» Genetic Algorithms for Dynamic Test Data Generation
Sort
View
71
Voted
ICML
2006
IEEE
15 years 10 months ago
Combined central and subspace clustering for computer vision applications
Central and subspace clustering methods are at the core of many segmentation problems in computer vision. However, both methods fail to give the correct segmentation in many pract...
Le Lu, René Vidal
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 4 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
BMCBI
2010
113views more  BMCBI 2010»
14 years 9 months ago
Improving performance of mammalian microRNA target prediction
Background: MicroRNAs (miRNAs) are single-stranded non-coding RNAs known to regulate a wide range of cellular processes by silencing the gene expression at the protein and/or mRNA...
Hui Liu, Dong Yue, Yidong Chen, Shou-Jiang Gao, Yu...
DAGSTUHL
2001
14 years 11 months ago
Visualization for the Mind's Eye
Software visualization has been almost exclusively tackled from the visual point of view; this means visualization occurs exclusively through the visual channel. This approach has ...
Nelson A. Baloian, Wolfram Luther
ACMSE
2009
ACM
14 years 7 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo