Sciweavers

424 search results - page 65 / 85
» Requirements Prioritization Challenges in Practice
Sort
View
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
13 years 7 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
TIFS
2008
149views more  TIFS 2008»
13 years 7 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
JITECH
2007
147views more  JITECH 2007»
13 years 7 months ago
Re-engineering at LeCroy Corporation: The move to component-based systems
This case study discusses two related aspects that are becoming increasingly important in today’s software development practice: re-engineering of a monolithic system into a com...
Julia Kotlarsky
PVLDB
2008
108views more  PVLDB 2008»
13 years 7 months ago
Sliding-window top-k queries on uncertain streams
Query processing on uncertain data streams has attracted a lot of attentions lately, due to the imprecise nature in the data generated from a variety of streaming applications, su...
Cheqing Jin, Ke Yi, Lei Chen 0002, Jeffrey Xu Yu, ...
CEC
2010
IEEE
13 years 5 months ago
Beating the 'world champion' evolutionary algorithm via REVAC tuning
Abstract-- We present a case study demonstrating that using the REVAC parameter tuning method we can greatly improve the `world champion' EA (the winner of the CEC2005 competi...
Selmar K. Smit, A. E. Eiben