Sciweavers

2006 search results - page 160 / 402
» Heuristic Security-Testing Methods
Sort
View
ACSAC
2008
IEEE
15 years 7 months ago
On Purely Automated Attacks and Click-Based Graphical Passwords
We present and evaluate various methods for purely automated attacks against click-based graphical passwords. Our purely automated methods combine click-order heuristics with focu...
Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oo...
BIBM
2007
IEEE
135views Bioinformatics» more  BIBM 2007»
15 years 7 months ago
Graph Kernel-Based Learning for Gene Function Prediction from Gene Interaction Network
Prediction of gene functions is a major challenge to biologists in the post-genomic era. Interactions between genes and their products compose networks and can be used to infer ge...
Xin Li, Zhu Zhang, Hsinchun Chen, Jiexun Li
ECBS
2007
IEEE
122views Hardware» more  ECBS 2007»
15 years 7 months ago
Time- and Space-Efficient Evaluation of Sparse Boolean Functions in Embedded Software
The paper addresses software implementation of large sparse systems of Boolean functions. Fast evaluation of such functions with the smallest memory consumption is often required ...
Vaclav Dvorak
GECCO
2007
Springer
153views Optimization» more  GECCO 2007»
15 years 7 months ago
Analyzing the effects of module encapsulation on search space bias
Modularity is thought to improve the evolvability of biological systems [18, 22]. Recent studies in the field of evolutionary computation show that the use of modularity improves...
Ozlem O. Garibay, Annie S. Wu
CPAIOR
2005
Springer
15 years 6 months ago
Filtering Algorithms for the NValue Constraint
Abstract. The NValue constraint counts the number of different values assigned to a vector of variables. Propagating generalized arc consistency on this constraint is NP-hard. We ...
Christian Bessière, Emmanuel Hebrard, Brahi...