Sciweavers

57 search results - page 9 / 12
» Selecting features for object detection using an AdaBoost-co...
Sort
View
AAAI
2008
13 years 9 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
POLICY
2007
Springer
14 years 1 months ago
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange
A VoIP PBX supports flexible call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. Both users and administrators need a flexi...
George Konstantoulakis, Morris Sloman
GECCO
2005
Springer
138views Optimization» more  GECCO 2005»
14 years 27 days ago
Promising infeasibility and multiple offspring incorporated to differential evolution for constrained optimization
In this paper, we incorporate a diversity mechanism to the differential evolution algorithm to solve constrained optimization problems without using a penalty function. The aim is...
Efrén Mezura-Montes, Jesús Vel&aacut...
BMCBI
2006
116views more  BMCBI 2006»
13 years 7 months ago
ROKU: a novel method for identification of tissue-specific genes
Background: One of the important goals of microarray research is the identification of genes whose expression is considerably higher or lower in some tissues than in others. We wo...
Koji Kadota, Jiazhen Ye, Yuji Nakai, Tohru Terada,...
WACV
2008
IEEE
14 years 1 months ago
Tracking Down Under: Following the Satin Bowerbird
Sociobiologists collect huge volumes of video to study animal behavior (our collaborators work with 30,000 hours of video). The scale of these datasets demands the development of ...
Aniruddha Kembhavi, Ryan Farrell, Yuancheng Luo, D...