Sciweavers

1253 search results - page 180 / 251
» An Experimental and Theoretical Comparison of Model Selectio...
Sort
View
MCS
2005
Springer
14 years 2 months ago
Half-Against-Half Multi-class Support Vector Machines
A Half-Against-Half (HAH) multi-class SVM is proposed in this paper. Unlike the commonly used One-Against-All (OVA) and One-Against-One (OVO) implementation methods, HAH is built ...
Hansheng Lei, Venu Govindaraju
EDCC
2008
Springer
13 years 10 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
BMCBI
2010
190views more  BMCBI 2010»
13 years 9 months ago
APIS: accurate prediction of hot spots in protein interfaces by combining protrusion index with solvent accessibility
Background: It is well known that most of the binding free energy of protein interaction is contributed by a few key hot spot residues. These residues are crucial for understandin...
Jun-Feng Xia, Xing-Ming Zhao, Jiangning Song, De-S...
IWCLS
2007
Springer
14 years 3 months ago
On Lookahead and Latent Learning in Simple LCS
Learning Classifier Systems use evolutionary algorithms to facilitate rule- discovery, where rule fitness is traditionally payoff based and assigned under a sharing scheme. Most c...
Larry Bull
WIDM
2004
ACM
14 years 2 months ago
User evaluation of the NASA technical report server recommendation service
We present the user evaluation of two recommendation server methodologies implemented for the NASA Technical Report Server (NTRS). One methodology for generating recommendations u...
Michael L. Nelson, Johan Bollen, JoAnne R. Calhoun...