Sciweavers

4650 search results - page 626 / 930
» Generating and evaluating evaluative arguments
Sort
View
SAC
2009
ACM
15 years 12 months ago
A gradient oriented recombination scheme for evolution strategies
This paper proposes a novel recombination scheme for evolutionary algorithms, which can guide the new population generation towards the maximum increase of the objective function....
Haifeng Chen, Guofei Jiang
ICSE
2009
IEEE-ACM
15 years 12 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
ICSE
2009
IEEE-ACM
15 years 12 months ago
Test selection for result inspection via mining predicate rules
It is labor-intensive to manually verify the outputs of a large set of tests that are not equipped with test oracles. Test selection helps to reduce this cost by selecting a small...
Wujie Zheng, Michael R. Lyu, Tao Xie
IPMI
2009
Springer
15 years 12 months ago
A Framework for Brain Registration via Simultaneous Surface and Volume Flow
Abstract. Volumetric registration of brain MR images presents a challenging problem due to the wide variety of sulcal folding patterns. We present a novel volumetric registration m...
Anand A. Joshi, Richard M. Leahy, Arthur W. Toga, ...
PAKDD
2009
ACM
135views Data Mining» more  PAKDD 2009»
15 years 12 months ago
On Mining Rating Dependencies in Online Collaborative Rating Networks
The trend of social information processing sees e-commerce and social web applications increasingly relying on user-generated content, such as rating, to determine the quality of o...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang