Sciweavers

2006 search results - page 395 / 402
» Heuristic Security-Testing Methods
Sort
View
MM
2010
ACM
151views Multimedia» more  MM 2010»
13 years 9 months ago
Enhanced exploration of oral history archives through processed video and synchronized text transcripts
A digital video library of over 900 hours of video and 18000 stories from The HistoryMakers was used by 266 students, faculty, librarians, and life-long learners interacting with ...
Michael G. Christel, Scott M. Stevens, Bryan Maher...
CCS
2010
ACM
13 years 9 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
AMC
2007
154views more  AMC 2007»
13 years 9 months ago
A hybrid particle swarm optimization-back-propagation algorithm for feedforward neural network training
The particle swarm optimization algorithm was showed to converge rapidly during the initial stages of a global search, but around global optimum, the search process will become ve...
Jing-Ru Zhang, Jun Zhang, Tat-Ming Lok, Michael R....
BMCBI
2010
135views more  BMCBI 2010»
13 years 9 months ago
Efficient genome-scale phylogenetic analysis under the duplication-loss and deep coalescence cost models
Background: Genomic data provide a wealth of new information for phylogenetic analysis. Yet making use of this data requires phylogenetic methods that can efficiently analyze extr...
Mukul S. Bansal, J. Gordon Burleigh, Oliver Eulens...
BMCBI
2007
126views more  BMCBI 2007»
13 years 9 months ago
Including probe-level uncertainty in model-based gene expression clustering
Background: Clustering is an important analysis performed on microarray gene expression data since it groups genes which have similar expression patterns and enables the explorati...
Xuejun Liu, Kevin K. Lin, Bogi Andersen, Magnus Ra...