The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Kad is a P2P protocol which has about 1 million concurrent online users. The eclipse attack is one of the most severe threats in Kad. In this paper, we propose a distributed verification approach to defend against the eclipse attack in Kad. Previous works mostly concentrate on ID generation or secure routing algorithm. Our approach utilizes many benign peers to prove that the storage peer is valid...
In statistical machine translation, the number of sentence pairs in the bilingual corpus is very important to the quality of translation. However, when the quantity reaches some extent, enlarging corpus has less effect on the translation, whereas increasing greatly the time and space complexity to building translation systems, which hinders the development of statistical machine translation. In this...
Biclustering methods allow us to identify genes with similar behavior with respect to different conditions. Ant colony optimization (ACO) algorithms have been shown to be effective problem solving strategies for multiple objective optimization (MOO). Multiple objective ant colony optimization (MOACO) mainly focuses on solving the multiple objective combinatorial optimization problems. This paper incorporates...
Latest microarray technique can measure the expression levels of thousands of genes under a set of conditions, and generates some large-scale microarray datasets. Biclustering can perform clustering of rows and columns of those dataset simultaneously, allowing the mining of additional information from microarray datasets which is important in bioinformatics research and biomedical applications. Since...
Constructing program invariants is one of the key problems of program verification. A lot of approaches to invariant generation have been reported, and all of these methods assume that program variables are evaluated over infinite domains such as rational or integer. Actually, during the execution of program, all variables are expressed using bit-vectors with limited width and evaluated over finite...
Latest microarray technique can measure the expression levels of a set of genes under a set of samples during a series of time points, and generates new datasets which are called gene-sample-time (simply GST) microarray data. Mining three-dimensional (3D) clusters from GST datasets is important in bioinformatics research and biomedical applications. Several objectives in conflict with each other have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.