Sciweavers

697 search results - page 118 / 140
» A Study of Evaluation Functions for the Graph K-Coloring Pro...
Sort
View
DIMVA
2010
13 years 9 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
BMCBI
2010
115views more  BMCBI 2010»
13 years 7 months ago
Multiconstrained gene clustering based on generalized projections
Background: Gene clustering for annotating gene functions is one of the fundamental issues in bioinformatics. The best clustering solution is often regularized by multiple constra...
Jia Zeng, Shanfeng Zhu, Alan Wee-Chung Liew, Hong ...
PVLDB
2008
127views more  PVLDB 2008»
13 years 7 months ago
Discovering data quality rules
Dirty data is a serious problem for businesses leading to incorrect decision making, inefficient daily operations, and ultimately wasting both time and money. Dirty data often ari...
Fei Chiang, Renée J. Miller
WSC
2000
13 years 9 months ago
A comparison of five steady-state truncation heuristics for simulation
We compare the performance of five well-known truncation heuristics for mitigating the effects of initialization bias in the output analysis of steady-state simulations. Two of th...
K. Preston White, Michael J. Cobb, Stephen C. Spra...
INFOCOM
2003
IEEE
14 years 27 days ago
Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach
—Wireless communications using ad hoc networks are receiving an increasing interest. The most attractive feature of ad hoc networks is the flexibility. The network is set up by ...
Peter Värbrand, Di Yuan, Patrik Björklun...