Sciweavers

2176 search results - page 387 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
15 years 6 months ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
15 years 3 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
IJCAI
1989
15 years 3 months ago
Program Derivation Using Analogy
We present a methodology for using analogy to derive programs based on a derivational transformation method. The derived programs are deductively closed under the rules in the kno...
Mehdi T. Harandi, Sanjay Bhansali
ECCV
2010
Springer
15 years 3 months ago
Location Recognition Using Prioritized Feature Matching
We present a fast, simple location recognition and image localization method that leverages feature correspondence and geometry estimated from large Internet photo collections. Suc...
Yunpeng Li, Noah Snavely, Daniel P. Huttenlocher
BMCBI
2010
176views more  BMCBI 2010»
15 years 2 months ago
TargetSpy: a supervised machine learning approach for microRNA target prediction
Background: Virtually all currently available microRNA target site prediction algorithms require the presence of a (conserved) seed match to the 5' end of the microRNA. Recen...
Martin Sturm, Michael Hackenberg, David Langenberg...