Sciweavers

2006 search results - page 253 / 402
» Heuristic Security-Testing Methods
Sort
View
136
Voted
ISSRE
2003
IEEE
15 years 6 months ago
Augmenting Simulated Annealing to Build Interaction Test Suites
Component based software development is prone to unexpected interaction faults. The goal is to test as many potential interactions as is feasible within time and budget constraint...
Myra B. Cohen, Charles J. Colbourn, Alan C. H. Lin...
249
Voted
CVPR
2010
IEEE
15 years 6 months ago
Visual Tracking via Weakly Supervised Learning from Multiple Imperfect Oracles
Long-term persistent tracking in ever-changing environments is a challenging task, which often requires addressing difficult object appearance update problems. To solve them, most...
Bineng Zhong, Hongxun Yao, Sheng Chen, Xiaotong Yu...
130
Voted
CP
2001
Springer
15 years 5 months ago
A CLP Approach to the Protein Side-Chain Placement Problem
Abstract. Selecting conformations for side-chains is an important subtask in building three-dimensional protein models. Side-chain placement is a difficult problem because of the l...
Martin T. Swain, Graham J. L. Kemp
ICCAD
1999
IEEE
125views Hardware» more  ICCAD 1999»
15 years 5 months ago
Direct synthesis of timed asynchronous circuits
This paper presents a new method to synthesize timed asynchronous circuits directly from the specification without generating a state graph. The synthesis procedure begins with a ...
Sung Tae Jung, Chris J. Myers
101
Voted
AUSAI
1999
Springer
15 years 5 months ago
Generating Rule Sets from Model Trees
Model trees—decision trees with linear models at the leaf nodes—have recently emerged as an accurate method for numeric prediction that produces understandable models. However,...
Geoffrey Holmes, Mark Hall, Eibe Frank