Sciweavers

JIKM
2011
101views more  JIKM 2011»
14 years 19 days ago
Automated Generation of Personal Data Reports from Relational Databases
Abstract. This paper presents a novel approach for extracting personal data and automatically generating Personal Data Reports (PDRs) from relational databases. Such PDRs can be us...
Georgios John Fakas, Ben Cawley, Zhi Cai
JGO
2011
165views more  JGO 2011»
14 years 19 days ago
A biased random-key genetic algorithm for routing and wavelength assignment
The problem of routing and wavelength assignment (RWA) in wavelength division multiplexing (WDM) optical networks consists in routing a set of lightpaths and assigning a wavelength...
Thiago F. Noronha, Mauricio G. C. Resende, Celso C...
JGO
2011
89views more  JGO 2011»
14 years 19 days ago
Model building using bi-level optimization
Abstract In many problems from different disciplines such as engineering, physics, medicine, and biology, a series of experimental data is used in order to generate a model that ca...
Georges K. Saharidis, Ioannis P. Androulakis, Mari...
JFP
2011
51views more  JFP 2011»
14 years 19 days ago
Balancing weight-balanced trees
Yoichi Hirai, Kazuhiko Yamamoto
JCT
2011
93views more  JCT 2011»
14 years 19 days ago
A graph-theoretic approach to quasigroup cycle numbers
Abstract. Norton and Stein associated a number with each idempotent quasigroup or diagonalized Latin square of given finite order n, showing that it is congruent mod 2 to the tria...
Brent Kerby, Jonathan D. H. Smith
JCST
2011
88views more  JCST 2011»
14 years 19 days ago
Transfer Learning via Multi-View Principal Component Analysis
Yangsheng Ji, Jiajun Chen, Gang Niu, Lin Shang, Xi...
JCS
2011
138views more  JCS 2011»
14 years 19 days ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...