Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
Background: Many protein families have undergone functional divergence after gene duplications such that current subgroups of the family carry out overlapping but distinct biologi...
Xiang Gao, Kent Vander Velden, Daniel F. Voytas, X...
3D-shape description requires the partition of objects in different parts. In this paper, we propose a new approach based on the analysis of a 3D skeleton. The skeleton is a repre...
Software clustering algorithms presented in the literature rarely incorporate in the clustering process dynamic information, such as the number of function invocations during runt...
Bill Andreopoulos, Aijun An, Vassilios Tzerpos, Xi...
We propose a model for level-ups in Heroes of Might and Magic III, and give an O 1 ε2 ln 1 δ learning algorithm to estimate the probabilities of secondary skills induced by any ...