Sciweavers

5232 search results - page 173 / 1047
» Generative modeling: a symbolic system for geometric modelin...
Sort
View
SEKE
2010
Springer
15 years 9 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
CEC
2007
IEEE
15 years 8 months ago
Graph design by graph grammar evolution
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...
Martin H. Luerssen, David M. W. Powers
COGSCI
2004
136views more  COGSCI 2004»
15 years 1 months ago
Generation and evaluation of user tailored responses in multimodal dialogue
When people engage in conversation, they tailor their utterances to their conversational partners, whether these partners are other humans or computational systems. This tailoring...
Marilyn A. Walker, Steve Whittaker, Amanda Stent, ...
ICAS
2006
IEEE
103views Robotics» more  ICAS 2006»
15 years 8 months ago
Model Driven capabilities of the DA-GRS model
— The development of applications that target dynamic networks often adresses the same difficulties. Since the underlying network topology is unstable, the application has to ha...
Arnaud Casteigts
GIS
2010
ACM
14 years 12 months ago
Tolerance geometry: Euclid's first postulate for points and lines with extension
Object representation and reasoning in vector based geographic information systems (GIS) is based on Euclidean geometry. Euclidean geometry is built upon Euclid's first postu...
Gwen Wilke, Andrew U. Frank