Sciweavers

2006 search results - page 1 / 402
» Heuristic Security-Testing Methods
Sort
View
JDFP
2006
63views more  JDFP 2006»
13 years 4 months ago
Heuristic Security-Testing Methods
John E. Kerivan
CASCON
2006
98views Education» more  CASCON 2006»
13 years 6 months ago
A lightweight approach to state based security testing
State based protocols are protocols in which the handling of one message depends on the contents of previous messages. Testing such protocols, for security or for other purposes u...
Songtao Zhang, Thomas R. Dean, Scott Knight
INFORMATICALT
2011
89views more  INFORMATICALT 2011»
12 years 11 months ago
Large-Scale Data Analysis Using Heuristic Methods
Estimation and modelling problems as they arise in many data analysis areas often turn out to be unstable and/or intractable by standard numerical methods. Such problems frequently...
Gintautas Dzemyda, Leonidas Sakalauskas
EOR
2011
193views more  EOR 2011»
12 years 11 months ago
A heuristic method for RCPSP with fuzzy activity times
Tarun Bhaskar, Manabendra N. Pal, Asim K. Pal
JORS
2011
53views more  JORS 2011»
12 years 11 months ago
Exact and heuristic methods for cell suppression in multi-dimensional linked tables
Stephen F. Roehrig, Rema Padman, Ramayya Krishnan,...