Sciweavers

77 search results - page 15 / 16
» Optimizing low-discrepancy sequences with an evolutionary al...
Sort
View
115
Voted
BMCBI
2010
104views more  BMCBI 2010»
15 years 19 days ago
Parameters for accurate genome alignment
Background: Genome sequence alignments form the basis of much research. Genome alignment depends on various mundane but critical choices, such as how to mask repeats and which sco...
Martin C. Frith, Michiaki Hamada, Paul Horton
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
15 years 5 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
93
Voted
BMCBI
2008
179views more  BMCBI 2008»
15 years 19 days ago
Bayesian modeling of recombination events in bacterial populations
Background: We consider the discovery of recombinant segments jointly with their origins within multilocus DNA sequences from bacteria representing heterogeneous populations of fa...
Pekka Marttinen, Adam Baldwin, William P. Hanage, ...
JACM
2006
99views more  JACM 2006»
15 years 14 days ago
Finding a maximum likelihood tree is hard
Abstract. Maximum likelihood (ML) is an increasingly popular optimality criterion for selecting evolutionary trees [Felsenstein 1981]. Finding optimal ML trees appears to be a very...
Benny Chor, Tamir Tuller
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 7 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...