Sciweavers

4466 search results - page 89 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
168
Voted
BIB
2011
14 years 11 months ago
Mutational analysis in RNAs: comparing programs for RNA deleterious mutation prediction
Programs for RNA mutational analysis that are structure-based and rely on secondary structure prediction have been developed and expanded in the past several years. They can be us...
Danny Barash, Alexander Churkin
SMI
1999
IEEE
193views Image Analysis» more  SMI 1999»
15 years 9 months ago
Modeling and Deformation Method of Human Body Model Based on Range Data
A cloth simulation system must generate a human body model based on measured data obtained from range data. We propose modeling and deformation methods based on such data. In our ...
Ryouji Matsuda, Tomuyuki Nishita
139
Voted
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
15 years 10 months ago
On the runtime analysis of the 1-ANT ACO algorithm
The runtime analysis of randomized search heuristics is a growing field where, in the last two decades, many rigorous results have been obtained. These results, however, apply pa...
Benjamin Doerr, Frank Neumann, Dirk Sudholt, Carst...
IMC
2003
ACM
15 years 10 months ago
Virtual landmarks for the internet
Internet coordinate schemes have been proposed as a method for estimating minimum round trip time between hosts without direct measurement. In such a scheme, each host is assigned...
Liying Tang, Mark Crovella
154
Voted
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 11 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li