Sciweavers

2748 search results - page 353 / 550
» Modelling Fuzzy Sets Using Object-Oriented Techniques
Sort
View
VMCAI
2005
Springer
15 years 10 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
ADBIS
2006
Springer
166views Database» more  ADBIS 2006»
15 years 10 months ago
Clustering-Based Materialized View Selection in Data Warehouses
materialized view selection is a non-trivial task. Hence, its complexity must be reduced. A judicious choice of views must be costdriven and influenced by the workload experienced...
Kamel Aouiche, Pierre-Emmanuel Jouve, Jér&o...
GECCO
2004
Springer
131views Optimization» more  GECCO 2004»
15 years 9 months ago
PolyEDA: Combining Estimation of Distribution Algorithms and Linear Inequality Constraints
Estimation of distribution algorithms (EDAs) are population-based heuristic search methods that use probabilistic models of good solutions to guide their search. When applied to co...
Jörn Grahl, Franz Rothlauf
SBBD
2004
119views Database» more  SBBD 2004»
15 years 5 months ago
Computing the Dependency Basis for Nested List Attributes
Multi-valued dependencies (MVDs) are an important class of constraints that is fundamental for relational database design. Although modern applications increasingly require the su...
Sven Hartmann, Sebastian Link
BMCBI
2008
126views more  BMCBI 2008»
15 years 4 months ago
Relating gene expression data on two-component systems to functional annotations in Escherichia coli
Background: Obtaining physiological insights from microarray experiments requires computational techniques that relate gene expression data to functional information. Traditionall...
Anne M. Denton, Jianfei Wu, Megan K. Townsend, Pre...