Sciweavers

22193 search results - page 4333 / 4439
» Multiple Restricted Multiplication
Sort
View
151
Voted
ESEM
2010
ACM
15 years 1 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
158
Voted
EVOW
2010
Springer
15 years 1 months ago
Finding Gapped Motifs by a Novel Evolutionary Algorithm
Background: Identifying approximately repeated patterns, or motifs, in DNA sequences from a set of co-regulated genes is an important step towards deciphering the complex gene reg...
Chengwei Lei, Jianhua Ruan
FGCS
2010
84views more  FGCS 2010»
15 years 1 months ago
System-level virtualization research at Oak Ridge National Laboratory
System-level virtualization is today enjoying a rebirth, after first gaining popularity in the 1970s as a technique to effectively share what were then considered large computin...
Stephen L. Scott, Geoffroy Vallée, Thomas N...
128
Voted
FSS
2010
147views more  FSS 2010»
15 years 1 months ago
A divide and conquer method for learning large Fuzzy Cognitive Maps
Fuzzy Cognitive Maps (FCMs) are a convenient tool for modeling and simulating dynamic systems. FCMs were applied in a large number of diverse areas and have already gained momentu...
Wojciech Stach, Lukasz A. Kurgan, Witold Pedrycz
114
Voted
GIS
2010
ACM
15 years 1 months ago
Topological reasoning between complex regions in databases with frequent updates
Reasoning about space has been a considerable field of study both in Artificial Intelligence and in spatial information theory. Many applications benefit from the inference of ...
Arif Khan, Markus Schneider
« Prev « First page 4333 / 4439 Last » Next »