Sciweavers

413 search results - page 74 / 83
» It outsourcing maturity model
Sort
View
GECCO
2007
Springer
160views Optimization» more  GECCO 2007»
14 years 2 months ago
Hill climbing on discrete HIFF: exploring the role of DNA transposition in long-term artificial evolution
We show how a random mutation hill climber that does multilevel selection utilizes transposition to escape local optima on the discrete Hierarchical-If-And-Only-If (HIFF) problem....
Susan Khor
HASKELL
2006
ACM
14 years 2 months ago
Running the manual: an approach to high-assurance microkernel development
We propose a development methodology for designing and prototyping high assurance microkernels, and describe our application of it. The methodology is based on rapid prototyping a...
Philip Derrin, Kevin Elphinstone, Gerwin Klein, Da...
CONTEXT
1999
Springer
14 years 22 days ago
Contexts, Domains, and Software
We survey some issues that relate to context dependence and context sensitivity in the development of software, particularly in relation to information systems by defining a range...
Alfs T. Berztiss
CCS
2008
ACM
13 years 10 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
BMCBI
2008
149views more  BMCBI 2008»
13 years 8 months ago
Evolution of biological sequences implies an extreme value distribution of type I for both global and local pairwise alignment s
Background: Confidence in pairwise alignments of biological sequences, obtained by various methods such as Blast or Smith-Waterman, is critical for automatic analyses of genomic d...
Olivier Bastien, Eric Maréchal