Sciweavers

1717 search results - page 263 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
JCB
2008
102views more  JCB 2008»
14 years 9 months ago
Canonical RNA Pseudoknot Structures
In this paper, we study k-noncrossing, -canonical RNA pseudoknot structures with minimum arc-length greater or equal to four. Let T OE4 k; .n/ denote the number of these structure...
Gang Ma, Christian M. Reidys
JCO
2006
96views more  JCO 2006»
14 years 9 months ago
One-dimensional optimal bounded-shape partitions for Schur convex sum objective functions
Consider the problem of partitioning n nonnegative numbers into p parts, where part i can be assigned ni numbers with ni lying in a given range. The goal is to maximize a Schur con...
F. H. Chang, H. B. Chen, J. Y. Guo, Frank K. Hwang...
IJMI
2007
140views more  IJMI 2007»
14 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
TALG
2008
124views more  TALG 2008»
14 years 9 months ago
Uniform deterministic dictionaries
Abstract. We present a new analysis of the well-known family of multiplicative hash functions, and improved deterministic algorithms for selecting "good" hash functions. ...
Milan Ruzic
JMM2
2007
148views more  JMM2 2007»
14 years 9 months ago
Object Segmentation Using Background Modelling and Cascaded Change Detection
— The automatic extraction and analysis of visual information is becoming generalised. The first step in this processing chain is usually separating or segmenting the captured v...
Luís Filipe Teixeira, Jaime S. Cardoso, Lu&...