Sciweavers

3090 search results - page 552 / 618
» On Testing Answer-Set Programs
Sort
View
LISA
2000
15 years 3 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
152
Voted
NIPS
1994
15 years 3 months ago
Using a neural net to instantiate a deformable model
Deformable models are an attractive approach to recognizing nonrigid objects which have considerable within class variability. However, there are severe search problems associated...
Christopher K. I. Williams, Michael Revow, Geoffre...
GECCO
2008
Springer
182views Optimization» more  GECCO 2008»
15 years 3 months ago
Scaling ant colony optimization with hierarchical reinforcement learning partitioning
This paper merges hierarchical reinforcement learning (HRL) with ant colony optimization (ACO) to produce a HRL ACO algorithm capable of generating solutions for large domains. Th...
Erik J. Dries, Gilbert L. Peterson
95
Voted
BMCBI
2010
137views more  BMCBI 2010»
15 years 2 months ago
BS Seeker: precise mapping for bisulfite sequencing
Background: Bisulfite sequencing using next generation sequencers yields genome-wide measurements of DNA methylation at single nucleotide resolution. Traditional aligners are not ...
Pao-Yang Chen, Shawn Cokus, Matteo Pellegrini
BMCBI
2008
195views more  BMCBI 2008»
15 years 2 months ago
Goldsurfer2 (Gs2): A comprehensive tool for the analysis and visualization of genome wide association studies
Background: Genome wide association (GWA) studies are now being widely undertaken aiming to find the link between genetic variations and common diseases. Ideally, a well-powered G...
Fredrik Pettersson, Andrew P. Morris, Michael R. B...