Sciweavers

4498 search results - page 690 / 900
» How to Invent Functions
Sort
View
122
Voted
IWFM
2003
15 years 5 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
141
Voted
WSCG
2004
185views more  WSCG 2004»
15 years 5 months ago
Automatic Fitting and Control of Complex Freeform Shapes in 3-D
In many computer graphics and computer-aided design problems, it is very common to find a smooth and well structured surface to fit a set of unstructured 3-dimensional data. Altho...
Yu Song, Joris S. M. Vergeest, Chensheng Wang
SCM
2003
15 years 5 months ago
Integrating Software Construction and Software Deployment
Classically, software deployment is a process consisting of building the software, packaging it for distribution, and installing it at the target site. This approach has two proble...
Eelco Dolstra
AAAI
2000
15 years 5 months ago
Self-Organization of Innate Face Preferences: Could Genetics Be Expressed through Learning?
Self-organizing models develop realistic cortical structures when given approximations of the visual environment as input, and are an effective way to model the development of fac...
James A. Bednar, Risto Miikkulainen
AAAI
1998
15 years 5 months ago
Multimodal Reasoning for Automatic Model Construction
This paper describes a program called Pret that automates system identification, the process of finding a dynamical model of a black-box system. Pret performs both structural iden...
Reinhard Stolle, Elizabeth Bradley