Sciweavers

1486 search results - page 287 / 298
» Firewall Rules Analysis
Sort
View
90
Voted
FOCS
2004
IEEE
15 years 1 months ago
Shuffling by Semi-Random Transpositions
In the cyclic-to-random shuffle, we are given n cards arranged in a circle. At step k, we exchange the k'th card along the circle with a uniformly chosen random card. The pro...
Elchanan Mossel, Yuval Peres, Alistair Sinclair
80
Voted
FASE
2006
Springer
15 years 1 months ago
Argus: Online Statistical Bug Detection
Statistical debugging is a powerful technique for identifying bugs that do not violate programming rules or program invariants. Previously known statistical debugging techniques ar...
Long Fei, Kyungwoo Lee, Fei Li, Samuel P. Midkiff
GECCO
2006
Springer
140views Optimization» more  GECCO 2006»
15 years 1 months ago
A representational ecology for learning classifier systems
The representation used by a learning algorithm introduces a bias which is more or less well-suited to any given learning problem. It is well known that, across all possible probl...
James A. R. Marshall, Tim Kovacs
ISMIR
2000
Springer
148views Music» more  ISMIR 2000»
15 years 1 months ago
IR for Contemporary Music: What the Musicologist Needs
Active listening is the core of musical activity Listening does not only concern receiving musical information. On the contrary, it is "active" and based on a set of int...
Alain Bonardi
SPATIALCOGNITION
2000
Springer
15 years 1 months ago
Interactive Layout Generation with a Diagrammatic Constraint Language
The paper analyzes a diagrammatic reasoning problem that consists in finding a graphical layout which simultaneously satisfies a set of constraints expressed in a formal language a...
Christoph Schlieder, Cornelius Hagen