Sciweavers

1202 search results - page 214 / 241
» Robust system multiangulation using subspace methods
Sort
View
ICPP
2007
IEEE
14 years 4 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
14 years 4 months ago
Analysis of noisy time-series signals with GA involving viral infection with tropism
In this paper we report on a study in which genetic algorithms are applied to the analysis of noisy time-series signals, which is related to the problem of analyzing the motion ch...
Yuji Sato, Yuta Yasuda, Ryuji Goto
BMCBI
2010
172views more  BMCBI 2010»
13 years 10 months ago
Comparison of evolutionary algorithms in gene regulatory network model inference
Background: The evolution of high throughput technologies that measure gene expression levels has created a data base for inferring GRNs (a process also known as reverse engineeri...
Alina Sîrbu, Heather J. Ruskin, Martin Crane
CGF
2011
13 years 1 months ago
BSSRDF Estimation from Single Images
We present a novel method to estimate an approximation of the reflectance characteristics of optically thick, homogeneous translucent materials using only a single photograph as ...
Adolfo Muñoz, Jose I. Echevarria, Francisco...
BTW
2005
Springer
108views Database» more  BTW 2005»
14 years 3 months ago
Integrating the Relational Interval Tree into IBM's DB2 Universal Database Server
: User-defined data types such as intervals require specialized access methods to be efficiently searched and queried. As database implementors cannot provide appropriate index str...
Christoph Brochhaus, Jost Enderle, Achim Schlosser...