Sciweavers

4299 search results - page 476 / 860
» Concurrent Test Generation
Sort
View
141
Voted
ACSAC
2006
IEEE
15 years 11 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
128
Voted
VTS
2005
IEEE
96views Hardware» more  VTS 2005»
15 years 10 months ago
Pseudo-Functional Scan-based BIST for Delay Fault
This paper presents a pseudo-functional BIST scheme that attempts to minimize the over-testing problem of logic BIST for delay and crosstalk-induced failures. The over-testing pro...
Yung-Chieh Lin, Feng Lu, Kwang-Ting Cheng
AUSAI
2005
Springer
15 years 10 months ago
A Lagrangian Heuristic for Winner Determination Problem in Combinatorial Auctions
Abstract. We present a Lagrangian-based heuristic LAHA for the Winner Determination Problem in Combinatorial Auctions. The algorithm makes use of the market computing power by appl...
Andrew Lim, Jiqing Tang
GW
2005
Springer
103views Biometrics» more  GW 2005»
15 years 10 months ago
Re-sampling for Chinese Sign Language Recognition
In Sign Language recognition, one of the problems is to collect enough data. Data collection for both training and testing is a laborious but necessary step. Almost all of the stat...
Chunli Wang, Xilin Chen, Wen Gao
113
Voted
ICANN
2005
Springer
15 years 10 months ago
Evolution of Heuristics for Give-Away Checkers
The efficacy of two evolutionary approaches to the problem of generation of heuristical linear and non-linear evaluation functions in the game of give-away checkers is tested in th...
Magdalena Kusiak, Karol Waledzik, Jacek Mandziuk