Sciweavers

6047 search results - page 1188 / 1210
» Modeling with Extend
Sort
View
APLAS
2010
ACM
13 years 10 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
AI
2010
Springer
13 years 9 months ago
Soft arc consistency revisited
The Valued Constraint Satisfaction Problem (VCSP) is a generic optimization problem defined by a network of local cost functions defined over discrete variables. It has applicatio...
Martin C. Cooper, Simon de Givry, M. Sanchez, Thom...
AROBOTS
2008
177views more  AROBOTS 2008»
13 years 9 months ago
Controlling swimming and crawling in a fish robot using a central pattern generator
Online trajectory generation for robots with multiple degrees of freedom is still a difficult and unsolved problem, in particular for non-steady state locomotion, that is, when th...
Alessandro Crespi, Daisy Lachat, Ariane Pasquier, ...
BIODATAMINING
2008
130views more  BIODATAMINING 2008»
13 years 9 months ago
Uncovering mechanisms of transcriptional regulations by systematic mining of cis regulatory elements with gene expression profil
Background: Contrary to the traditional biology approach, where the expression patterns of a handful of genes are studied at a time, microarray experiments enable biologists to st...
Qicheng Ma, Gung-Wei Chirn, Joseph D. Szustakowski...
BMCBI
2010
130views more  BMCBI 2010»
13 years 9 months ago
The behaviour of random forest permutation-based variable importance measures under predictor correlation
Background: Random forests (RF) have been increasingly used in applications such as genome-wide association and microarray studies where predictor correlation is frequently observ...
Kristin K. Nicodemus, James D. Malley, Carolin Str...
« Prev « First page 1188 / 1210 Last » Next »