Sciweavers

1579 search results - page 313 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
ISF
2008
114views more  ISF 2008»
14 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
MP
2006
138views more  MP 2006»
14 years 9 months ago
A new ILP-based refinement heuristic for Vehicle Routing Problems
In the paper we address the Distance-Constrained Capacitated Vehicle Routing Problem (DCVRP), where k minimum-cost routes through a central depot have to be constructed so as to co...
Roberto De Franceschi, Matteo Fischetti, Paolo Tot...
104
Voted
TSE
2008
148views more  TSE 2008»
14 years 9 months ago
Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings
Software defect prediction strives to improve software quality and testing efficiency by constructing predictive classification models from code attributes to enable a timely ident...
Stefan Lessmann, Bart Baesens, Christophe Mues, Sw...
BMCBI
2004
208views more  BMCBI 2004»
14 years 9 months ago
Using 3D Hidden Markov Models that explicitly represent spatial coordinates to model and compare protein structures
Background: Hidden Markov Models (HMMs) have proven very useful in computational biology for such applications as sequence pattern matching, gene-finding, and structure prediction...
Vadim Alexandrov, Mark Gerstein
ANSOFT
1998
140views more  ANSOFT 1998»
14 years 9 months ago
FORM: A Feature-Oriented Reuse Method with Domain-Specific Reference Architectures
Systematic discovery and exploitation of commonality across related software systems is a fundamental technical requirement for achieving successful software reuse. By examining a...
Kyo Chul Kang, Sajoong Kim, Jaejoon Lee, Kijoo Kim...