Sciweavers

2006 search results - page 155 / 402
» Heuristic Security-Testing Methods
Sort
View
80
Voted
HICSS
1994
IEEE
105views Biometrics» more  HICSS 1994»
15 years 5 months ago
A Methodology for Equational Reasoning
1 This paper presents a methodology to guide equational reasoning in a goal directed way. Suggested by rippling methods developed in the eld of inductive theorem proving we use att...
Jürgen Cleve, Dieter Hutter
APWEB
2006
Springer
15 years 4 months ago
Building Content Clusters Based on Modelling Page Pairs
We give a new view on building content clusters from page pair models. We measure the heuristic importance within every two pages by computing the distance of their accessed positi...
Christoph Meinel, Long Wang 0002
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 4 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
97
Voted
ACSD
2003
IEEE
102views Hardware» more  ACSD 2003»
15 years 4 months ago
Specification Coverage Aided Test Selection
In this paper test selection strategies in formal conformance testing are considered. As the testing conformance relation we use the ioco relation, and extend the previously prese...
Tuomo Pyhälä, Keijo Heljanko
92
Voted
AISB
1995
Springer
15 years 4 months ago
Specialised Recombinative Operators for Timetabling Problems
This paper discusses a series of recombination operators for the timetabling problem. These operators act upon a direct representation of the timetable and maintain the property of...
Edmund K. Burke, Dave Elliman, Rupert F. Weare