Sciweavers

9974 search results - page 1885 / 1995
» Software Interconnection Models
Sort
View
ESORICS
2010
Springer
15 years 2 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
HPDC
2010
IEEE
15 years 2 months ago
Improving the Hadoop map/reduce framework to support concurrent appends through the BlobSeer BLOB management system
Hadoop is a reference software framework supporting the Map/Reduce programming model. It relies on the Hadoop Distributed File System (HDFS) as its primary storage system. Althoug...
Diana Moise, Gabriel Antoniu, Luc Bougé
113
Voted
GCB
2008
Springer
103views Biometrics» more  GCB 2008»
15 years 2 months ago
Utilizing Promoter Pair Orientations for HMM-based Analysis of ChIP-chip Data
: Array-based analysis of chromatin immunoprecipitation data (ChIP-chip) is a powerful technique for identifying DNA target regions of individual transcription factors. Here, we pr...
Michael Seifert, Jens Keilwagen, Marc Strickert, I...
GECCO
2008
Springer
147views Optimization» more  GECCO 2008»
15 years 2 months ago
On selecting the best individual in noisy environments
In evolutionary algorithms, the typical post-processing phase involves selection of the best-of-run individual, which becomes the final outcome of the evolutionary run. Trivial f...
Wojciech Jaskowski, Wojciech Kotlowski
115
Voted
ICML
2010
IEEE
15 years 2 months ago
Simple and Efficient Multiple Kernel Learning by Group Lasso
We consider the problem of how to improve the efficiency of Multiple Kernel Learning (MKL). In literature, MKL is often solved by an alternating approach: (1) the minimization of ...
Zenglin Xu, Rong Jin, Haiqin Yang, Irwin King, Mic...
« Prev « First page 1885 / 1995 Last » Next »