Sciweavers

667 search results - page 30 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
GECCO
2006
Springer
216views Optimization» more  GECCO 2006»
15 years 3 months ago
Comparative analysis of the sailor assignment problem
In this work the performance of several local search and metaheuristic methods is compared to previously reported work using evolutionary algorithms. The results show that while m...
Joseph Vannucci, Deon Garrett, Dipankar Dasgupta
TCOS
2010
14 years 6 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
VLDB
1987
ACM
66views Database» more  VLDB 1987»
15 years 3 months ago
A New Compression Method with Fast Searching on Large Databases
In this paper, a new compression method for constant removal from very large scientific and statistical databases is presented. The new method combines the best features from seve...
Jianzhong Li, Doron Rotem, Harry K. T. Wong
BMCBI
2006
153views more  BMCBI 2006»
14 years 12 months ago
Cancer diagnosis marker extraction for soft tissue sarcomas based on gene expression profiling data by using projective adaptive
Background: Recent advances in genome technologies have provided an excellent opportunity to determine the complete biological characteristics of neoplastic tissues, resulting in ...
Hiro Takahashi, Takeshi Nemoto, Teruhiko Yoshida, ...
NIPS
2007
15 years 1 months ago
Statistical Analysis of Semi-Supervised Regression
Semi-supervised methods use unlabeled data in addition to labeled data to construct predictors. While existing semi-supervised methods have shown some promising empirical performa...
John D. Lafferty, Larry A. Wasserman