Sciweavers

30 search results - page 5 / 6
» Exploiting Common Object Usage in Test Case Generation
Sort
View
COMSWARE
2006
IEEE
13 years 11 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
CEC
2010
IEEE
13 years 6 months ago
Coordinate System Archive for coevolution
Problems in which some entities interact with each other are common in computational intelligence. This scenario, typical for co-evolving artificial-life agents, learning strategie...
Wojciech Jaskowski, Krzysztof Krawiec
ICRA
1994
IEEE
147views Robotics» more  ICRA 1994»
13 years 9 months ago
Provable Strategies for Vision-Guided Exploration in Three Dimensions
An approach is presented for exploring an unknown, arbitrary surface in three-dimensional (3D) space by a mobile robot. The main contributions are (1) an analysis of the capabilit...
Kiriakos N. Kutulakos, Charles R. Dyer, Vladimir J...
ECIS
2000
13 years 6 months ago
Metadata-Based Integration of Qualitative and Quantitative Information Resources Approaching Knowledge Management
This paper presents a concept for the integration of quantitative and qualitative information sources with their accompanying management support functionalities from navigation and...
Bodo Rieger, Anja Kleber, Eitel von Maur
FGCS
2006
144views more  FGCS 2006»
13 years 5 months ago
BioSimGrid: Grid-enabled biomolecular simulation data storage and analysis
In computational biomolecular research, large amounts of simulation data are generated to capture the motion of proteins. These massive simulation data can be analysed in a number...
Muan Hong Ng, Steven Johnston, Bing Wu, Stuart E. ...