Sciweavers

1687 search results - page 74 / 338
» Which pointer analysis should I use
Sort
View
132
Voted
JNW
2008
167views more  JNW 2008»
15 years 3 months ago
Analyzing the ENRON Communication Network Using Agent-Based Simulation
Agent-based modeling, simulation, and network analysis approaches are one of the emergent techniques among soft computing literature. This paper presents an agent-based model for a...
Shinako Matsuyama, Takao Terano
130
Voted
GECCO
2008
Springer
158views Optimization» more  GECCO 2008»
15 years 4 months ago
Convergence analysis of quantum-inspired genetic algorithms with the population of a single individual
In this paper, the Quantum-inspired Genetic Algorithms with the population of a single individual are formalized by a Markov chain model using a single and the stored best individ...
Mehrshad Khosraviani, Saadat Pour-Mozafari, Mohamm...
122
Voted
CANDC
2000
ACM
15 years 3 months ago
Sequence Complexity for Biological Sequence Analysis
A new statistical model for DNA considers a sequence to be a mixture of regions with little structure and regions that are approximate repeats of other subsequences, i.e. instance...
Lloyd Allison, Linda Stern, Timothy Edgoose, Trevo...
149
Voted
JMLR
2002
160views more  JMLR 2002»
15 years 3 months ago
Kernel Independent Component Analysis
We present a class of algorithms for independent component analysis (ICA) which use contrast functions based on canonical correlations in a reproducing kernel Hilbert space. On th...
Francis R. Bach, Michael I. Jordan
134
Voted
TACAS
2009
Springer
207views Algorithms» more  TACAS 2009»
15 years 10 months ago
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control
Abstract. Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative Role-Based Access Control (ARBAC) specifies how an RBAC poli...
Mikhail I. Gofman, Ruiqi Luo, Ayla C. Solomon, Yin...