Sciweavers

5722 search results - page 194 / 1145
» Security Function Interactions
Sort
View
IDEAL
2007
Springer
15 years 7 months ago
PINCoC : A Co-clustering Based Approach to Analyze Protein-Protein Interaction Networks
A novel technique to search for functional modules in a protein-protein interaction network is presented. The network is represented by the adjacency matrix associated with the und...
Clara Pizzuti, Simona E. Rombo
107
Voted
ESAW
2008
Springer
15 years 2 months ago
Interaction Biases in Multi-Agent Simulations: An Experimental Study
Abstract. How to ensure that two different implementations of a simulation will produce the same results ? In order to assure simulation reproducibility, some domain-independent fu...
Yoann Kubera, Philippe Mathieu, Sébastien P...
ALIFE
2006
15 years 25 days ago
Through the Interaction of Neutral and Adaptive Mutations, Evolutionary Search Finds a Way
An evolutionary system that supports the interaction of neutral and adaptive mutations is investigated. Experimental results on a Boolean function and needle-in-haystack problems s...
Tina Yu, Julian Francis Miller
IAT
2010
IEEE
14 years 10 months ago
An Interactive Tool for Constrained Clustering with Human Sampling
Abstract--This paper describes an interactive tool for constrained clustering that helps users to select effective constraints efficiently during the constrained clustering process...
Masayuki Okabe, Seiji Yamada
89
Voted
ICFP
2007
ACM
16 years 22 days ago
Functional pearl: the great escape or, how to jump the border without getting caught
Filinski showed that callcc and a single mutable reference cell are sufficient to express the delimited control operators shift and reset. However, this implementation interacts p...
David Herman