Sciweavers

56 search results - page 7 / 12
» A Method Based on Genetic Algorithms and Fuzzy Logic to Indu...
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 7 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
BMCBI
2008
146views more  BMCBI 2008»
13 years 7 months ago
Rank-based edge reconstruction for scale-free genetic regulatory networks
Background: The reconstruction of genetic regulatory networks from microarray gene expression data has been a challenging task in bioinformatics. Various approaches to this proble...
Guanrao Chen, Peter Larsen, Eyad Almasri, Yang Dai
CMSB
2006
Springer
13 years 11 months ago
Regulatory Network Reconstruction Using Stochastic Logical Networks
Abstract. This paper presents a method for regulatory network reconstruction from experimental data. We propose a mathematical model for regulatory interactions, based on the work ...
Bartek Wilczynski, Jerzy Tiuryn
ICCD
1994
IEEE
142views Hardware» more  ICCD 1994»
13 years 11 months ago
Grammar-Based Optimization of Synthesis Scenarios
Systems for multi-level logic optimization are usually based on a set of specialized, loosely-related transformations which work on a network representation. The sequence of trans...
Andreas Kuehlmann, Lukas P. P. P. van Ginneken
EH
1999
IEEE
351views Hardware» more  EH 1999»
13 years 11 months ago
Evolvable Hardware or Learning Hardware? Induction of State Machines from Temporal Logic Constraints
Here we advocate an approach to learning hardware based on induction of finite state machines from temporal logic constraints. The method involves training on examples, constraint...
Marek A. Perkowski, Alan Mishchenko, Anatoli N. Ch...