Sciweavers

2236 search results - page 378 / 448
» Intrusion detection techniques and approaches
Sort
View
GECCO
2005
Springer
138views Optimization» more  GECCO 2005»
14 years 2 months ago
Promising infeasibility and multiple offspring incorporated to differential evolution for constrained optimization
In this paper, we incorporate a diversity mechanism to the differential evolution algorithm to solve constrained optimization problems without using a penalty function. The aim is...
Efrén Mezura-Montes, Jesús Vel&aacut...
IPMI
2005
Springer
14 years 2 months ago
Imaging Tumor Microenvironment with Ultrasound
Abstract. Recent advances in molecular biology are providing new opportunities for breast cancer imaging. Our approach uses ultrasound to image viscoelastic features of tumors. The...
Mallika Sridhar, Michael F. Insana
BMCBI
2008
138views more  BMCBI 2008»
13 years 9 months ago
CASCADE: a novel quasi all paths-based network analysis algorithm for clustering biological interactions
Background: Quantitative characterization of the topological characteristics of protein-protein interaction (PPI) networks can enable the elucidation of biological functional modu...
Woochang Hwang, Young-Rae Cho, Aidong Zhang, Mural...
JSS
2010
120views more  JSS 2010»
13 years 7 months ago
An evaluation of timed scenario notations
There is a general consensus on the importance of good Requirements Engineering (RE) for achieving high quality software. The modeling and analysis of requirements have been the m...
Jameleddine Hassine, Juergen Rilling, Rachida Dsso...
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 7 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone