Sciweavers

1247 search results - page 160 / 250
» Genetic algorithms for mentor-assisted evaluation function o...
Sort
View
129
Voted
CIBCB
2007
IEEE
15 years 7 months ago
Hybrid Architecture for Accelerating DNA Codeword Library Searching
-- A large and reliable DNA codeword library is the key to the success of DNA based computing. Searching for the set of reliable DNA codewords is an NP-hard problem, which can take...
Qinru Qiu, Daniel J. Burns, Qing Wu, Prakash Mukre
IEEEARES
2010
IEEE
15 years 7 months ago
Optimising IDS Sensor Placement
—In large network environments multiple intrusion detection sensors are needed to adequately monitor network traffic. However, deploying and managing additional sensors on a lar...
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard C...
IAJIT
2008
207views more  IAJIT 2008»
15 years 3 months ago
Neural Networks and Support Vector Machines Classifiers for Writer Identification Using Arabic Script
: In this paper, we present an approach for writer identification carried out using off-line Arabic handwriting. Our proposed method is based on the combination of global and struc...
Sami Gazzah, Najoua Essoukri Ben Amara
INFORMATICASI
1998
122views more  INFORMATICASI 1998»
15 years 3 months ago
Experimental Evaluation of Three Partition Selection Criteria for Decision Table Decomposition
Decision table decomposition is a machine learning approach that decomposes a given decision table into an equivalent hierarchy of decision tables. The approach aims to discover d...
Blaz Zupan, Marko Bohanec
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
16 years 3 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...