Sciweavers

2421 search results - page 24 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CCGRID
2007
IEEE
14 years 5 months ago
Integrated Data Reorganization and Disk Mapping for Reducing Disk Energy Consumption
Increasing power consumption of high-performance systems leads to reliability, survivability, and cooling related problems. Motivated by this observation, several recent efforts f...
Seung Woo Son, Mahmut T. Kandemir
BMCBI
2006
157views more  BMCBI 2006»
13 years 11 months ago
Determination of the minimum number of microarray experiments for discovery of gene expression patterns
Background: One type of DNA microarray experiment is discovery of gene expression patterns for a cell line undergoing a biological process over a series of time points. Two import...
Fang-Xiang Wu, W. J. Zhang, Anthony J. Kusalik
GECCO
2004
Springer
244views Optimization» more  GECCO 2004»
14 years 4 months ago
Using Clustering Techniques to Improve the Performance of a Multi-objective Particle Swarm Optimizer
In this paper, we present an extension of the heuristic called “particle swarm optimization” (PSO) that is able to deal with multiobjective optimization problems. Our approach ...
Gregorio Toscano Pulido, Carlos A. Coello Coello
GECCO
2004
Springer
14 years 4 months ago
Systematic Integration of Parameterized Local Search Techniques in Evolutionary Algorithms
Application-specific, parameterized local search algorithms (PLSAs), in which optimization accuracy can be traded off with runtime, arise naturally in many optimization contexts....
Neal K. Bambha, Shuvra S. Bhattacharyya, Jürg...
ACSAC
2003
IEEE
14 years 4 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt