Sciweavers

2635 search results - page 488 / 527
» Computing multihomogeneous resultants using straight-line pr...
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 8 months ago
Parameterizing by the Number of Numbers
The usefulness of parameterized algorithmics has often depended on what Niedermeier has called, "the art of problem parameterization." In this paper we introduce and expl...
Michael R. Fellows, Serge Gaspers, Frances A. Rosa...
MSWIM
2004
ACM
14 years 2 months ago
Scalable simulation of large-scale wireless networks with bounded inaccuracies
Discrete event network simulators have emerged as popular tools for verification and performance evaluation for various wireless networks. Nevertheless, the desire to model such ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Rajive Bag...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
GECCO
2006
Springer
198views Optimization» more  GECCO 2006»
14 years 12 days ago
Reward allotment in an event-driven hybrid learning classifier system for online soccer games
This paper describes our study into the concept of using rewards in a classifier system applied to the acquisition of decision-making algorithms for agents in a soccer game. Our a...
Yuji Sato, Yosuke Akatsuka, Takenori Nishizono
BMCBI
2007
106views more  BMCBI 2007»
13 years 8 months ago
Mining prokaryotic genomes for unknown amino acids: a stop-codon-based approach
Background: Selenocysteine and pyrrolysine are the 21st and 22nd amino acids, which are genetically encoded by stop codons. Since a number of microbial genomes have been completel...
Masashi Fujita, Hisaaki Mihara, Susumu Goto, Nobuy...