Sciweavers

2905 search results - page 394 / 581
» Formal Memetic Algorithms
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 8 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
112
Voted
ASIAN
2006
Springer
98views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Information Hiding in the Join Calculus
Abstract. We aim to provide information hiding support in concurrent object-oriented programming languages. We study the issue both at the object level and class level, in the cont...
Qin Ma 0002, Luc Maranget
CAV
2006
Springer
132views Hardware» more  CAV 2006»
15 years 7 months ago
Symmetry Reduction for Probabilistic Model Checking
We present an approach for applying symmetry reduction techniques to probabilistic model checking, a formal verification method for the quantitative analysis of systems with stocha...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
133
Voted
ESA
2006
Springer
134views Algorithms» more  ESA 2006»
15 years 7 months ago
A Unified Approach to Approximating Partial Covering Problems
An instance of the generalized partial cover problem consists of a ground set U and a family of subsets S 2U . Each element e U is associated with a profit p(e), whereas each su...
Jochen Könemann, Ojas Parekh, Danny Segev
143
Voted
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 7 months ago
Inference of genetic networks using S-system: information criteria for model selection
In this paper we present an evolutionary approach for inferring the structure and dynamics in gene circuits from observed expression kinetics. For representing the regulatory inte...
Nasimul Noman, Hitoshi Iba