Sciweavers

762 search results - page 132 / 153
» The Necessity of Combining Adaptation Methods
Sort
View
BMCBI
2011
14 years 4 months ago
A mutation degree model for the identification of transcriptional regulatory elements
Background: Current approaches for identifying transcriptional regulatory elements are mainly via the combination of two properties, the evolutionary conservation and the overrepr...
Changqing Zhang, Jin Wang, Xu Hua, Jinggui Fang, H...
102
Voted
IACR
2011
86views more  IACR 2011»
14 years 13 days ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
GECCO
2009
Springer
112views Optimization» more  GECCO 2009»
15 years 7 months ago
Soft memory for stock market analysis using linear and developmental genetic programming
Recently, a form of memory usage was introduced for genetic programming (GP) called “soft memory.” Rather than have a new value completely overwrite the old value in a registe...
Garnett Carl Wilson, Wolfgang Banzhaf
TASLP
2010
188views more  TASLP 2010»
14 years 11 months ago
MusicBox: Personalized Music Recommendation Based on Cubic Analysis of Social Tags
—Social tagging is becoming increasingly popular in music information retrieval (MIR). It allows users to tag music items like songs, albums, or artists. Social tags are valuable...
Alexandros Nanopoulos, Dimitrios Rafailidis, Panag...
SIGIR
2009
ACM
15 years 7 months ago
Risky business: modeling and exploiting uncertainty in information retrieval
Most retrieval models estimate the relevance of each document to a query and rank the documents accordingly. However, such an approach ignores the uncertainty associated with the ...
Jianhan Zhu, Jun Wang, Ingemar J. Cox, Michael J. ...