Sciweavers

372 search results - page 48 / 75
» Evaluating Lexical Substitution: Analysis and New Measures
Sort
View
KBS
2011
116views more  KBS 2011»
13 years 2 months ago
Advanced empirical testing
In today’s industrial applications, we see that knowledge systems are successfully implemented. However, critical domains require the elaborate and thoughtful validation of the ...
Joachim Baumeister
ISSRE
2002
IEEE
14 years 26 days ago
Mutation of Java Objects
Fault insertion based techniqueshave been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating m...
Roger T. Alexander, James M. Bieman, Sudipto Ghosh...
BMCBI
2006
201views more  BMCBI 2006»
13 years 8 months ago
Gene selection algorithms for microarray data based on least squares support vector machine
Background: In discriminant analysis of microarray data, usually a small number of samples are expressed by a large number of genes. It is not only difficult but also unnecessary ...
E. Ke Tang, Ponnuthurai N. Suganthan, Xin Yao
BMCBI
2006
94views more  BMCBI 2006»
13 years 8 months ago
Simulation of microarray data with realistic characteristics
Background: Microarray technologies have become common tools in biological research. As a result, a need for effective computational methods for data analysis has emerged. Numerou...
Matti Nykter, Tommi Aho, Miika Ahdesmäki, Pek...
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...