Sciweavers

8828 search results - page 1624 / 1766
» Formal methods in practice
Sort
View
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 8 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
ESCIENCE
2006
IEEE
15 years 7 months ago
Scientific Workflows: More e-Science Mileage from Cyberinfrastructure
We view scientific workflows as the domain scientist's way to harness cyberinfrastructure for e-Science. Domain scientists are often interested in "end-to-end" fram...
Bertram Ludäscher, Shawn Bowers, Timothy M. M...
138
Voted
GD
2006
Springer
15 years 7 months ago
Planarity Testing and Optimal Edge Insertion with Embedding Constraints
The planarization method has proven to be successful in graph drawing. The output, a combinatorial planar embedding of the so-called planarized graph, can be combined with state-o...
Carsten Gutwenger, Karsten Klein, Petra Mutzel
118
Voted
GECCO
2006
Springer
186views Optimization» more  GECCO 2006»
15 years 7 months ago
Genetic programming for agricultural purposes
Nitrogen is one of the most important chemical intakes to ensure the healthy growth of agricultural crops. However, some environmental concerns emerge (soil and water pollution) w...
Clément Chion, Luis E. Da Costa, Jacques-An...
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
15 years 7 months ago
Multi-step environment learning classifier systems applied to hyper-heuristics
Heuristic Algorithms (HA) are very widely used to tackle practical problems in operations research. They are simple, easy to understand and inspire confidence. Many of these HAs a...
Javier G. Marín-Blázquez, Sonia Schu...
« Prev « First page 1624 / 1766 Last » Next »