Sciweavers

2006 search results - page 266 / 402
» Heuristic Security-Testing Methods
Sort
View
ICDAR
2009
IEEE
15 years 9 months ago
Script-Independent Handwritten Textlines Segmentation Using Active Contours
Handwritten document images contain textlines with multi orientations, touching and overlapping characters within consecutive textlines, and small inter-line spacing making textli...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...
ISDA
2009
IEEE
15 years 9 months ago
MAHATMA: A Genetic Programming-Based Tool for Protein Classification
Proteins can be grouped into families according to some features such as hydrophobicity, composition or structure, aiming to establish common biological functions. This paper pres...
Denise Fukumi Tsunoda, Alex Alves Freitas, Heitor ...
WABI
2009
Springer
109views Bioinformatics» more  WABI 2009»
15 years 9 months ago
Fast Prediction of RNA-RNA Interaction
Regulatory antisense RNAs are a class of ncRNAs that regulate gene expression by prohibiting the translation of an mRNA by establishing stable interactions with a target sequence. ...
Raheleh Salari, Rolf Backofen, Süleyman Cenk ...
125
Voted
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
15 years 9 months ago
Evolutionary optimization of multistage interconnection networks performance
The paper deals with optimization of collective communications on multistage interconnection networks (MINs). In the experimental work, unidirectional MINs like Omega, Butterfly a...
Jirí Jaros
GECCO
2009
Springer
144views Optimization» more  GECCO 2009»
15 years 9 months ago
Cheating for problem solving: a genetic algorithm with social interactions
We propose a variation of the standard genetic algorithm that incorporates social interaction between the individuals in the population. Our goal is to understand the evolutionary...
Rafael Lahoz-Beltra, Gabriela Ochoa, Uwe Aickelin