Sciweavers

1653 search results - page 317 / 331
» Directed tree-width examples
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 6 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
IVC
2008
147views more  IVC 2008»
13 years 6 months ago
Distinctive and compact features
We consider the problem of extracting features for multi-class recognition problems. The features are required to make fine distinction between similar classes, combined with tole...
Ayelet Akselrod-Ballin, Shimon Ullman
JCB
2006
144views more  JCB 2006»
13 years 6 months ago
Modeling Virus Self-Assembly Pathways: Avoiding Dynamics Using Geometric Constraint Decomposition
We develop a model for elucidating the assembly pathways by which an icosahedral viral shell forms from 60 identical constituent protein monomers. This poorly understood process a...
Meera Sitharam, Mavis Agbandje-Mckenna
JUCS
2008
123views more  JUCS 2008»
13 years 6 months ago
Beyond ASCII - Parsing Programs with Graphical Presentations
: Proxima is a generic structure editor suitable for a wide range of structured document types. It allows edit operations on the document structure as well as on its screen represe...
Martijn M. Schrage, S. Doaitse Swierstra
EC
2007
160views ECommerce» more  EC 2007»
13 years 6 months ago
Agent-Based Model of Genotype Editing
Evolutionary algorithms rarely deal with ontogenetic, non-inherited alteration of genetic information because they are based on a direct genotype-phenotype mapping. In contrast, i...
Chien-Feng Huang, Jasleen Kaur, Ana Gabriela Magui...