Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
This paper presents and evaluates sequential instance-based learning (SIBL), an approach to action selection based upon data gleaned from prior problem solving experiences. SIBL le...
We present an optimization algorithm based on a model of bacterial chemotaxis. The original biological model is used to formulate a simple optimization algorithm, which is evaluate...
The aim of this paper is to describe a Quality of Service (QoS) model enabling to measure the perceptual quality of video transmissions by exploiting metrics from different layers...
Biological systems have recently been shown to share many of the properties of reactive systems. This observation has led to the idea of using methods devised for the construction ...
Jasmin Fisher, David Harel, E. Jane Albert Hubbard...