Sciweavers

970 search results - page 70 / 194
» A comprehensive analysis of hyper-heuristics
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 8 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
KBSE
2005
IEEE
14 years 1 months ago
On dynamic feature location
Feature location aims at locating pieces of code that implement a given set of features (requirements). It is a necessary first step in every program comprehension and maintenanc...
Rainer Koschke, Jochen Quante
RTSS
2009
IEEE
14 years 2 months ago
Rapid Early-Phase Virtual Integration
In complex hard real-time systems with tight constraints on system resources, small changes in one component of a system can cause a cascade of adverse effects on other parts of t...
Sibin Mohan, Min-Young Nam, Rodolfo Pellizzoni, Lu...
ICDAR
2003
IEEE
14 years 1 months ago
Individuality of Handwritten Characters
Analysis of handwritten characters (allographs) plays an important role in forensic document examination. However, so far there lacks a comprehensive and quantitative study on ind...
Bin Zhang, Sargur N. Srihari, Sangjik Lee
BIB
2006
150views more  BIB 2006»
13 years 8 months ago
Open source tools and toolkits for bioinformatics: significance, and where are we?
This review summarizes important work in open-source bioinformatics software that has occurred over the past couple of years. The survey is intended to illustrate how programs and...
Jason E. Stajich, Hilmar Lapp