Sciweavers

937 search results - page 160 / 188
» Employing Simulation to Evaluate Designs: The APEX Approach
Sort
View
NDSS
2008
IEEE
15 years 6 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
APIN
1998
107views more  APIN 1998»
14 years 11 months ago
Multiple Adaptive Agents for Tactical Driving
Abstract. Recent research in automated highway systems has ranged from low-level vision-based controllers to high-level route-guidance software. However, there is currently no syst...
Rahul Sukthankar, Shumeet Baluja, John Hancock
CORR
2011
Springer
160views Education» more  CORR 2011»
14 years 3 months ago
Searching for Bayesian Network Structures in the Space of Restricted Acyclic Partially Directed Graphs
Although many algorithms have been designed to construct Bayesian network structures using different approaches and principles, they all employ only two methods: those based on i...
Silvia Acid, Luis M. de Campos
CASES
2008
ACM
15 years 1 months ago
Cache-aware cross-profiling for java processors
Performance evaluation of embedded software is essential in an early development phase so as to ensure that the software will run on the embedded device's limited computing r...
Walter Binder, Alex Villazón, Martin Schoeb...
GECCO
2005
Springer
141views Optimization» more  GECCO 2005»
15 years 5 months ago
Constructing good learners using evolved pattern generators
Self-organization of brain areas in animals begins prenatally, evidently driven by spontaneously generated internal patterns. The neural structures continue to develop postnatally...
Vinod K. Valsalam, James A. Bednar, Risto Miikkula...