Sciweavers

959 search results - page 164 / 192
» Transfers between Logics and their Applications
Sort
View
DIMVA
2006
15 years 3 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
15 years 2 months ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
AUTOMATICA
2007
88views more  AUTOMATICA 2007»
15 years 2 months ago
Three and higher dimensional autonomous formations: Rigidity, persistence and structural persistence
In this paper, we generalize the notion of persistence, which has been originally introduced for two-dimensional formations, to Rd for d 3, seeking to provide a theoretical framew...
Changbin Yu, Julien M. Hendrickx, Baris Fidan, Bri...
BMCBI
2010
201views more  BMCBI 2010»
15 years 2 months ago
Analysis of X-ray Structures of Matrix Metalloproteinases via Chaotic Map Clustering
Background: Matrix metalloproteinases (MMPs) are well-known biological targets implicated in tumour progression, homeostatic regulation, innate immunity, impaired delivery of pro-...
Ilenia Giangreco, Orazio Nicolotti, Angelo Carotti...
126
Voted
BMCBI
2007
167views more  BMCBI 2007»
15 years 2 months ago
Applying negative rule mining to improve genome annotation
Background: Unsupervised annotation of proteins by software pipelines suffers from very high error rates. Spurious functional assignments are usually caused by unwarranted homolog...
Irena I. Artamonova, Goar Frishman, Dmitrij Frishm...