Sciweavers

271 search results - page 49 / 55
» A Model for Software Selection with Fuzzy Linguistic Informa...
Sort
View
CCS
2008
ACM
13 years 10 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
AAAI
2008
13 years 11 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
ALIFE
2006
13 years 8 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho
BMCBI
2006
114views more  BMCBI 2006»
13 years 8 months ago
Impact of RNA structure on the prediction of donor and acceptor splice sites
Background: gene identification in genomic DNA sequences by computational methods has become an important task in bioinformatics and computational gene prediction tools are now es...
Sayed-Amir Marashi, Changiz Eslahchi, Hamid Pezesh...
BIOSYSTEMS
2008
129views more  BIOSYSTEMS 2008»
13 years 8 months ago
Reconstruction of DNA sequences using genetic algorithms and cellular automata: Towards mutation prediction?
Change of DNA sequence that fuels evolution is, to a certain extent, a deterministic process because mutagenesis does not occur in an absolutely random manner. So far, it has not ...
Ch. Mizas, Georgios Ch. Sirakoulis, Vasilios A. Ma...