Sciweavers

817 search results - page 132 / 164
» Malware behaviour analysis
Sort
View
AI
2006
Springer
14 years 12 months ago
Backward-chaining evolutionary algorithms
Starting from some simple observations on a popular selection method in Evolutionary Algorithms (EAs)--tournament selection--we highlight a previously-unknown source of inefficien...
Riccardo Poli, William B. Langdon
ENTCS
2008
146views more  ENTCS 2008»
14 years 12 months ago
Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions
istic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions Michael J. A. Smith1 ,2 Laboratory for Foundations of Computer Science University of Edinb...
Michael J. A. Smith
EJIS
2007
139views more  EJIS 2007»
14 years 11 months ago
Applying TAM across cultures: the need for caution
The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many differ...
Scott McCoy, Dennis F. Galletta, William R. King
ICSE
2000
IEEE-ACM
15 years 3 months ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley
SIAMAM
2008
170views more  SIAMAM 2008»
14 years 11 months ago
Absolute Stability and Complete Synchronization in a Class of Neural Fields Models
Neural fields are an interesting option for modelling macroscopic parts of the cortex involving several populations of neurons, like cortical areas. Two classes of neural field equ...
Olivier D. Faugeras, François Grimbert, Jea...