Sciweavers

10715 search results - page 137 / 2143
» Proofs from Tests
Sort
View
CEC
2010
IEEE
13 years 12 months ago
Iterated local search vs. hyper-heuristics: Towards general-purpose search algorithms
An important challenge within hyper-heuristic research is to design search methodologies that work well, not only across different instances of the same problem, but also across di...
Edmund K. Burke, Timothy Curtois, Matthew R. Hyde,...
BMCBI
2007
155views more  BMCBI 2007»
13 years 10 months ago
ProMEX: a mass spectral reference database for proteins and protein phosphorylation sites
Background: In the last decade, techniques were established for the large scale genome-wide analysis of proteins, RNA, and metabolites, and database solutions have been developed ...
Jan Hummel, Michaela Niemann, Stefanie Wienkoop, W...
EJC
2007
13 years 10 months ago
Quickly deciding minor-closed parameters in general graphs
We construct algorithms for deciding essentially any minor-closed parameter, with explicit time bounds. This result strengthens previous results by Robertson and Seymour [1,2], Fr...
Erik D. Demaine, Mohammad Taghi Hajiaghayi
JMIV
2008
118views more  JMIV 2008»
13 years 10 months ago
Recognising Algebraic Surfaces from Two Outlines
Photographic outlines of 3 dimensional solids are robust and rich in information useful for surface reconstruction. This paper studies algebraic surfaces viewed from 2 cameras with...
Simon Collings, Ryszard Kozera, Lyle Noakes
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 10 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu