Sciweavers

1687 search results - page 248 / 338
» Which pointer analysis should I use
Sort
View
GECCO
2009
Springer
127views Optimization» more  GECCO 2009»
15 years 10 months ago
Geometrical insights into the dendritic cell algorithm
This work examines the dendritic cell algorithm (DCA) from a mathematical perspective. By representing the signal processing phase of the algorithm using the dot product it is sho...
Thomas Stibor, Robert Oates, Graham Kendall, Jonat...
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
15 years 10 months ago
EPIC: Ending Piracy of Integrated Circuits
As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized exces...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
MOBICOM
2004
ACM
15 years 9 months ago
Modeling mobility for vehicular ad-hoc networks
Without realistic modeling of node mobility, simulation evaluation of performance of mobile ad hoc networks may not correlate well with performance in a real deployment. In this p...
Amit Kumar Saha, David B. Johnson
142
Voted
SIGIR
2003
ACM
15 years 9 months ago
Probabilistic term variant generator for biomedical terms
This paper presents an algorithm to generate possible variants for biomedical terms. The algorithm gives each variant its generation probability representing its plausibility, whi...
Yoshimasa Tsuruoka, Jun-ichi Tsujii
ATAL
2008
Springer
15 years 6 months ago
Agent-based simulation of the spatial dynamics of crime: on the interplay between criminal hot spots and reputation
An important challenge within the field of Criminology is to investigate the spatio-temporal dynamics of crime. Typical questions in this area are how the behaviour of offenders, ...
Tibor Bosse, Charlotte Gerritsen