Sciweavers

467 search results - page 48 / 94
» I O-automata Based Testing
Sort
View
IEEEARES
2010
IEEE
15 years 7 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
95
Voted
GIS
2009
ACM
15 years 7 months ago
Tree detection from aerial imagery
We propose an automatic approach to tree detection from aerial imagery. First a pixel-level classifier is trained to assign a {tree, non-tree} label to each pixel in an aerial im...
Lin Yang, Xiaqing Wu, Emil Praun, Xiaoxu Ma
CLUSTER
2009
IEEE
15 years 7 months ago
Overlapping computation and communication in SMT clusters with commodity interconnects
Abstract—In this paper we focus on optimizing the performance in a cluster of Simultaneous Multithreading (SMT) processors connected with a commodity interconnect (e.g. Gbit Ethe...
Georgios I. Goumas, Nikos Anastopoulos, Nectarios ...
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
15 years 7 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
GECCO
2009
Springer
124views Optimization» more  GECCO 2009»
15 years 7 months ago
Three interconnected parameters for genetic algorithms
When an optimization problem is encoded using genetic algorithms, one must address issues of population size, crossover and mutation operators and probabilities, stopping criteria...
Pedro A. Diaz-Gomez, Dean F. Hougen