Sciweavers

2977 search results - page 563 / 596
» Evaluating the Effectiveness of Keyword Search
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
ICDCS
2006
IEEE
14 years 1 months ago
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP
Peer-to-peer (P2P) technology has been successfully applied in Internet telephony or Voice over Internet Protocol (VoIP), such as the Skype system, where P2P is used for both sear...
Shansi Ren, Lei Guo, Xiaodong Zhang
PRICAI
2004
Springer
14 years 1 months ago
Computational Methods for Identification of Human microRNA Precursors
MicroRNA (miRNA), one of non-coding RNAs (ncRNAs), regulates gene expression directly by arresting the messenger RNA (mRNA) translation, which is important for identifying putative...
Jin-Wu Nam, Wha-Jin Lee, Byoung-Tak Zhang
GECCO
2003
Springer
129views Optimization» more  GECCO 2003»
14 years 28 days ago
Inherent Fault Tolerance in Evolved Sorting Networks
This poster paper summarizes our research on fault tolerance arising as a by-product of the evolutionary computation process. Past research has shown evidence of robustness emergin...
Rob Shepherd, James A. Foster
SIGGRAPH
1997
ACM
13 years 12 months ago
Adapting simulated behaviors for new characters
This paper describes an algorithm for automatically adapting existing simulated behaviors to new characters. Animating a new character is difficult because a control system tuned...
Jessica K. Hodgins, Nancy S. Pollard