Sciweavers

712 search results - page 114 / 143
» New Techniques for Generation and Analysis of Evolutionary T...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
WSC
2000
13 years 9 months ago
Improved decision processes through simultaneous simulation and time dilation
Simulation models are often not used to their full potential in the decision-making process. The default simulation strategy of simple serial replication of fixed length runs mean...
Paul Hyden, Lee Schruben
AAAI
1998
13 years 9 months ago
"Squeaky Wheel" Optimization
We describe a general approach to optimization which we term Squeaky Wheel" Optimization SWO. In SWO, a greedy algorithm is used to construct a solution which is then analyze...
David Joslin, David P. Clements
IPPS
2003
IEEE
14 years 1 months ago
A Compilation Framework for Distributed Memory Parallelization of Data Mining Algorithms
With the availability of large datasets in a variety of scientific and commercial domains, data mining has emerged as an important area within the last decade. Data mining techni...
Xiaogang Li, Ruoming Jin, Gagan Agrawal
ISVC
2009
Springer
14 years 2 months ago
Wavelet-Based Representation of Biological Shapes
Modeling, characterization and analysis of biological shapes and forms are important in many computational biology studies. Shape representation challenges span the spectrum from s...
Bin Dong, Yu Mao, Ivo D. Dinov, Zhuowen Tu, Yongga...