Sciweavers

2006 search results - page 245 / 402
» Heuristic Security-Testing Methods
Sort
View
GECCO
2008
Springer
199views Optimization» more  GECCO 2008»
15 years 2 months ago
Analysis of multi-objective evolutionary algorithms to optimize dynamic data types in embedded systems
New multimedia embedded applications are increasingly dynamic, and rely on Dynamically-allocated Data Types (DDTs) to store their data. The optimization of DDTs for each target em...
José Ignacio Hidalgo, José L. Risco-...
115
Voted
BMCBI
2004
123views more  BMCBI 2004»
15 years 29 days ago
Interaction profile-based protein classification of death domain
Background: The increasing number of protein sequences and 3D structure obtained from genomic initiatives is leading many of us to focus on proteomics, and to dedicate our experim...
Drew Lett, Michael Hsing, Frederic Pio
146
Voted
DATAMINE
1999
143views more  DATAMINE 1999»
15 years 23 days ago
Partitioning Nominal Attributes in Decision Trees
To find the optimal branching of a nominal attribute at a node in an L-ary decision tree, one is often forced to search over all possible L-ary partitions for the one that yields t...
Don Coppersmith, Se June Hong, Jonathan R. M. Hosk...
123
Voted
CHI
2004
ACM
16 years 1 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass
93
Voted
GECCO
2007
Springer
167views Optimization» more  GECCO 2007»
15 years 7 months ago
An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data
This paper describes an extension to the Restricted Growth Function grouping Genetic Algorithm applied to the Consensus Clustering of a retinal nerve fibre layer data-set. Consens...
Stephen Swift, Allan Tucker, Jason Crampton, David...