Sciweavers

2006 search results - page 154 / 402
» Heuristic Security-Testing Methods
Sort
View
92
Voted
WCRE
2003
IEEE
15 years 6 months ago
Revealing Class Structure with Concept Lattices
This paper promotes the use of a mathematical concept lattice based upon the binary relation of accesses between methods and fields as a novel visualization of individual JAVA cl...
Uri Dekel, Yossi Gil
91
Voted
EVOW
2003
Springer
15 years 6 months ago
A Genetic Algorithm for the Index Selection Problem
This paper considers the problem of minimizing the response time for a given database workload by a proper choice of indexes. This problem is NP-hard and known in the literature as...
Jozef Kratica, Ivana Ljubic, Dusan Tosic
ECAL
2001
Springer
15 years 5 months ago
Taxonomy in Alife. Measures of Similarity for Complex Artificial Organisms
In this paper a formal approach to construction of a similarity measure for complex creatures is presented. The simulation model is described, and a Framsticks agent is expressed i...
Maciej Komosinski, Marek Kubiak
CADE
2000
Springer
15 years 5 months ago
Two Techniques to Improve Finite Model Search
Abstract. This article introduces two techniques to improve the propagation efficiency of CSP based finite model generation methods. One approach consists in statically rewriting ...
Gilles Audemard, Belaid Benhamou, Laurent Henocque
105
Voted
EURODAC
1994
IEEE
123views VHDL» more  EURODAC 1994»
15 years 5 months ago
Testing redundant asynchronous circuits by variable phase splitting
An approach for stuck-at-i and delay-fault testing of redundant circuits without modifying the logic is proposed. The only requirement is the ability to control both phases of eac...
Luciano Lavagno, Antonio Lioy, Michael Kishinevsky