Sciweavers

SAC
2006
ACM
14 years 2 months ago
Adaptive mutation with fitness and allele distribution correlation for genetic algorithms
In this paper, a new gene based adaptive mutation scheme is proposed for genetic algorithms (GAs), where the information on gene based fitness statistics and on gene based allele...
Shengxiang Yang, Sima Uyar
SAC
2006
ACM
14 years 2 months ago
Semantic-based information retrieval of biomedical data
In this paper, we propose to improve the effectiveness of biomedical information retrieval via a medical thesaurus. We analyzed the deficiencies of the existing medical thesauri a...
Peng Yan, Yu Jiao, Ali R. Hurson, Thomas E. Potok
SAC
2006
ACM
14 years 2 months ago
Towards value disclosure analysis in modeling general databases
The issue of confidentiality and privacy in general databases has become increasingly prominent in recent years. A key element in preserving privacy and confidentiality of sensi...
Xintao Wu, Songtao Guo, Yingjiu Li
SAC
2006
ACM
14 years 2 months ago
Facial emotion recognition by adaptive processing of tree structures
We present an emotion recognition system based on a probabilistic approach to adaptive processing of Facial Emotion Tree Structures (FETS). FETS are made up of localized Gabor fea...
Jia-Jun Wong, Siu-Yeung Cho
SAC
2006
ACM
14 years 2 months ago
Distributed collaborative filtering for peer-to-peer file sharing systems
Collaborative filtering requires a centralized rating database. However, within a peer-to-peer network such a centralized database is not readily available. In this paper, we pro...
Jun Wang, Johan A. Pouwelse, Reginald L. Lagendijk...
SAC
2006
ACM
14 years 2 months ago
Schemes for SR-Tree packing
Modern database applications like geographic information systems, multimedia databases, and digital libraries dealing with huge volumes of high dimensional data, make use of multi...
Jayendra Venkateswaran, S. R. Subramanya
SAC
2006
ACM
14 years 2 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
SAC
2006
ACM
14 years 2 months ago
Automated generation of monitors for pattern contracts
Benjamin Tyler, Jason O. Hallstrom, Neelam Soundar...