Sciweavers

2006 search results - page 122 / 402
» Heuristic Security-Testing Methods
Sort
View
116
Voted
IJISTA
2007
119views more  IJISTA 2007»
15 years 19 days ago
Online modelling based on Genetic Programming
: Genetic Programming (GP), a heuristic optimisation technique based on the theory of Genetic Algorithms (GAs), is a method successfully used to identify non-linear model structure...
Stephan M. Winkler, Hajrudin Efendic, Luigi del Re...
89
Voted
BMCBI
2004
91views more  BMCBI 2004»
15 years 18 days ago
Improved hit criteria for DNA local alignment
The hit criterion is a key component of heuristic local alignment algorithms. It specifies a class of patterns assumed to witness a potential similarity, and this choice is decisi...
Laurent Noé, Gregory Kucherov
86
Voted
GCB
2010
Springer
145views Biometrics» more  GCB 2010»
14 years 10 months ago
Shape-based Barrier Estimation for RNAs
: The ability of some RNA molecules to switch between different metastable conformations plays an important role in cellular processes. In order to identify such molecules and to p...
Sergiy Bogomolov, Martin Mann, Björn Voß...
123
Voted
IV
2010
IEEE
186views Visualization» more  IV 2010»
14 years 10 months ago
Visual Amortization Analysis of Recompilation Strategies
Abstract--Dynamic recompilation tries to produce more efficient code by exploiting runtime information. Virtual machines like the Jikes RVM use recompilation heuristics to decide h...
Stephan Zimmer, Stephan Diehl
COMGEO
2012
ACM
13 years 8 months ago
Routing multi-class traffic flows in the plane
We study a class of multi-commodity flow problems in geometric domains: For a given planar domain P populated with obstacles (holes) of K ≥ 2 types, compute a set of thick path...
Joondong Kim, Joseph S. B. Mitchell, Valentin Poli...