Sciweavers

1329 search results - page 221 / 266
» Constraint-based model synthesis
Sort
View
FORTE
2008
15 years 3 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
GECCO
2008
Springer
201views Optimization» more  GECCO 2008»
15 years 3 months ago
Advanced techniques for the creation and propagation of modules in cartesian genetic programming
The choice of an appropriate hardware representation model is key to successful evolution of digital circuits. One of the most popular models is cartesian genetic programming, whi...
Paul Kaufmann, Marco Platzner
IJES
2006
134views more  IJES 2006»
15 years 1 months ago
Applying model-driven development to distributed real-time and embedded avionics systems
Model-driven development (MDD) is an emerging paradigm that uses domain-specific modeling languages (DSMLs) and generative technologies to provide "correct-by-construction&quo...
Krishnakumar Balasubramanian, Arvind S. Krishna, E...
KI
2008
Springer
15 years 1 months ago
Enhancing Animated Agents in an Instrumented Poker Game
In this paper we present an interactive poker game in which one human user plays against two animated agents using RFID-tagged poker cards. The game is used as a showcase to illust...
Marc Schröder, Patrick Gebhard, Marcela Charf...
AUTOMATICA
2005
126views more  AUTOMATICA 2005»
15 years 1 months ago
Relations between uncertainty structures in identification for robust control
Various techniques of system identification exist that provide a nominal model and an uncertainty bound. An important question is what the implications are for the particular choi...
Sippe G. Douma, Paul M. J. Van den Hof