Sciweavers

2168 search results - page 165 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
GECCO
2008
Springer
186views Optimization» more  GECCO 2008»
15 years 5 months ago
A pareto following variation operator for fast-converging multiobjective evolutionary algorithms
One of the major difficulties when applying Multiobjective Evolutionary Algorithms (MOEA) to real world problems is the large number of objective function evaluations. Approximate...
A. K. M. Khaled Ahsan Talukder, Michael Kirley, Ra...
ATAL
2007
Springer
15 years 10 months ago
Towards using multiple cues for robust object recognition
A robot’s ability to assist humans in a variety of tasks, e.g. in search and rescue or in a household, heavily depends on the robot’s reliable recognition of the objects in th...
Sarah Aboutalib, Manuela M. Veloso
CCS
2005
ACM
15 years 9 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
135
Voted
DIM
2005
ACM
15 years 6 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
BMCBI
2005
130views more  BMCBI 2005»
15 years 4 months ago
Some statistical properties of regulatory DNA sequences, and their use in predicting regulatory regions in the Drosophila genome
Background: This paper addresses the problem of recognising DNA cis-regulatory modules which are located far from genes. Experimental procedures for this are slow and costly, and ...
Irina I. Abnizova, Rene te Boekhorst, Klaudia Walt...