Sciweavers

326 search results - page 30 / 66
» Algorithms for Pattern Involvement in Permutations
Sort
View
181
Voted
PROCEDIA
2011
14 years 5 months ago
Exact Closest String as a Constraint Satisfaction Problem
We report the first evaluation of Constraint Satisfaction as a computational framework for solving closest string problems. We show that careful consideration of symbol occurrenc...
Tom Kelsey, Lars Kotthoff
115
Voted
CSREASAM
2007
15 years 4 months ago
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques
— In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole...
Maitreya Natu, Adarshpal S. Sethi
BMCBI
2008
166views more  BMCBI 2008»
15 years 2 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
GECCO
2000
Springer
112views Optimization» more  GECCO 2000»
15 years 6 months ago
Linguistic Rule Extraction by Genetics-Based Machine Learning
This paper shows how linguistic classification knowledge can be extracted from numerical data for pattern classification problems with many continuous attributes by genetic algori...
Hisao Ishibuchi, Tomoharu Nakashima
MSWIM
2004
ACM
15 years 8 months ago
Outdoor experimental comparison of four ad hoc routing algorithms
Most comparisons of wireless ad hoc routing algorithms involve simulated or indoor trial runs, or outdoor runs with only a small number of nodes, potentially leading to an incorre...
Robert S. Gray, David Kotz, Calvin C. Newport, Nik...