We propose a new evolutionary method of extracting user preferences from examples shown to an automatic graph layout system. Using stochastic methods such as simulated annealing a...
This paper shows how to construct static analyzers using tree automata and rewriting techniques. Starting from a term rewriting system representing the operational semantics of the...
Yohan Boichut, Thomas Genet, Thomas P. Jensen, Luk...
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
We present a visual data mining application using the combination of clinical data, pathways and biomolecular data. Using pathways to navigate and filter the clinical and molecula...
In this paper we present a computational approach to developing effective training systems for virtual simulation environments. In particular, we focus on a Naval simulation syste...
Monica N. Nicolescu, Ryan E. Leigh, Adam Olendersk...