Sciweavers

1614 search results - page 310 / 323
» Polymorphism and Genetic Programming
Sort
View
IEEECIT
2010
IEEE
13 years 5 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
SIGSOFT
2010
ACM
13 years 5 months ago
A study of the uniqueness of source code
This paper presents the results of the first study of the uniqueness of source code. We define the uniqueness of a unit of source code with respect to the entire body of written s...
Mark Gabel, Zhendong Su
JCIT
2010
172views more  JCIT 2010»
13 years 2 months ago
Conditional Sensor Deployment Using Evolutionary Algorithms
Sensor deployment is a critical issue, as it affects the cost and detection capabilities of a wireless sensor network. Although many previous efforts have addressed this issue, mo...
M. Sami Soliman, Guanzheng Tan
BMCBI
2008
109views more  BMCBI 2008»
13 years 7 months ago
Merging microsatellite data: enhanced methodology and software to combine genotype data for linkage and association analysis
Background: Correctly merged data sets that have been independently genotyped can increase statistical power in linkage and association studies. However, alleles from microsatelli...
Angela P. Presson, Eric M. Sobel, Paivi Pajukanta,...
NAR
1998
94views more  NAR 1998»
13 years 7 months ago
HuGeMap: a distributed and integrated Human Genome Map database
The HuGeMap database stores the major genetic and physical maps of the human genome. It is also interconnected with the gene radiation hybrid mapping database RHdb. HuGeMap is acc...
Emmanuel Barillot, Frédéric Guyon, C...