Sciweavers

2558 search results - page 104 / 512
» Analysis of Generalized Pattern Searches
Sort
View
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 3 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
JCDL
2011
ACM
272views Education» more  JCDL 2011»
14 years 24 days ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
PPSC
2001
14 years 11 months ago
A Mathematical Cache Miss Analysis for Pointer Data Structures
As the gap between processor and memory performance widens, careful analyses and optimizations of cache memory behavior become increasingly important. While analysis of regular lo...
Hongli Zhang, Margaret Martonosi
COMPUTER
2006
98views more  COMPUTER 2006»
14 years 10 months ago
Componentization: The Visitor Example
: In software design, laziness is a virtue: it's better to reuse than to redo. Design patterns are a good illustration. Patterns, a major advance in software architecture, pro...
Bertrand Meyer, Karine Arnout
EUSFLAT
2003
145views Fuzzy Logic» more  EUSFLAT 2003»
14 years 11 months ago
Proximity fuzzy clustering for web context analysis
This study extends the web classification approach through a proximity-based fuzzy clustering sensible to the influence of the page. The proximity-based fuzzy clustering works in ...
Vincenzo Loia, Witold Pedrycz, Sabrina Senatore