Sciweavers

860 search results - page 62 / 172
» Podcasting made simple
Sort
View
153
Voted
PRIB
2009
Springer
209views Bioinformatics» more  PRIB 2009»
15 years 10 months ago
Class Prediction from Disparate Biological Data Sources Using an Iterative Multi-Kernel Algorithm
For many biomedical modelling tasks a number of different types of data may influence predictions made by the model. An established approach to pursuing supervised learning with ...
Yiming Ying, Colin Campbell, Theodoros Damoulas, M...
117
Voted
RE
2009
Springer
15 years 10 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu
133
Voted
APLAS
2009
ACM
15 years 10 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
134
Voted
DEBS
2009
ACM
15 years 10 months ago
PrivateFlow: decentralised information flow control in event based middleware
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by thirdparty exten...
Ioannis Papagiannis, Matteo Migliavacca, Peter R. ...
149
Voted
CEC
2008
IEEE
15 years 10 months ago
A study on constrained MA using GA and SQP: Analytical vs. finite-difference gradients
— Many deterministic algorithms in the context of constrained optimization require the first-order derivatives, or the gradient vectors, of the objective and constraint function...
Stephanus Daniel Handoko, Chee Keong Kwoh, Yew-Soo...