Sciweavers

1128 search results - page 186 / 226
» Structuring anonymity metrics
Sort
View
FGR
2004
IEEE
231views Biometrics» more  FGR 2004»
14 years 17 days ago
A Boosted Classifier Tree for Hand Shape Detection
The ability to detect a persons unconstrained hand in a natural video sequence has applications in sign language, gesture recognition and HCI. This paper presents a novel, unsuper...
Eng-Jon Ong, Richard Bowden
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
14 years 15 days ago
Genetic programming for human oral bioavailability of drugs
Automatically assessing the value of bioavailability from the chemical structure of a molecule is a very important issue in biomedicine and pharmacology. In this paper, we present...
Francesco Archetti, Stefano Lanzeni, Enza Messina,...
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
14 years 15 days ago
Identification of weak motifs in multiple biological sequences using genetic algorithm
Recognition of motifs in multiple unaligned sequences provides an insight into protein structure and function. The task of discovering these motifs is very challenging because mos...
Topon Kumar Paul, Hitoshi Iba
GECCO
2006
Springer
167views Optimization» more  GECCO 2006»
14 years 15 days ago
Estimating the destructiveness of crossover on binary tree representations
In some cases, evolutionary algorithms represent individuals as typical binary trees with n leaves and n-1 internal nodes. When designing a crossover operator for a particular rep...
Luke Sheneman, James A. Foster
DSN
2000
IEEE
14 years 14 days ago
On the Emulation of Software Faults by Software Fault Injection
This paper presents an experimental study on the emulation of software faults by fault injection. In a first experiment, a set of real software faults has been compared with fault...
Henrique Madeira, Diamantino Costa, Marco Vieira