Sciweavers

3686 search results - page 372 / 738
» Comprehensive comprehensions
Sort
View
138
Voted
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 10 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiļ...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
IVA
2009
Springer
15 years 10 months ago
Human-Centered Distributed Conversational Modeling: Efficient Modeling of Robust Virtual Human Conversations
Currently, applications that focus on providing conversations with virtual humans require extensive work to create robust conversational models. We present a new approach called Hu...
Brent Rossen, Scott Lind, Benjamin Lok
MODELS
2009
Springer
15 years 10 months ago
Catch Me If You Can - Debugging Support for Model Transformations
Abstract. Model-Driven Engineering places models as first-class artifacts throughout the software lifecycle requiring the availability of proper transformation languages. Although...
Johannes Schönböck, Gerti Kappel, Angeli...
114
Voted
ICEGOV
2009
ACM
15 years 10 months ago
Framework of e-governance at the local government level
With presumptions that e-government theories prevail in various formats and concepts around the globe, nations and institutions, not many examples are there to emulate in terms of...
Hakikur Rahman
143
Voted
ISLPED
2009
ACM
125views Hardware» more  ISLPED 2009»
15 years 10 months ago
Behavior-level observability don't-cares and application to low-power behavioral synthesis
Many techniques for power management employed in advanced RTL synthesis tools rely explicitly or implicitly on observability don’t-care (ODC) conditions. In this paper we presen...
Jason Cong, Bin Liu, Zhiru Zhang