Sciweavers

36 search results - page 7 / 8
» Model-Based Exploration in Continuous State Spaces
Sort
View
IEEEARES
2010
IEEE
13 years 10 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
SCHULE
2007
Springer
14 years 11 days ago
Exploratory Learning
: In our department we have a long history of developing interfaces for learning, which are framed by constructivist and constructionist theories of learning. Thus we try to create...
Ivan Kalas, D. Lehotska
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 1 months ago
Online Learning in Opportunistic Spectrum Access: A Restless Bandit Approach
We consider an opportunistic spectrum access (OSA) problem where the time-varying condition of each channel (e.g., as a result of random fading or certain primary users' activ...
Cem Tekin, Mingyan Liu
MTV
2005
IEEE
100views Hardware» more  MTV 2005»
13 years 12 months ago
A Study of Architecture Description Languages from a Model-based Perspective
Abstract— Owing to the recent trend of using applicationspecific instruction-set processors (ASIP), many Architecture Description Languages (ADLs) have been created. They specif...
Wei Qin, Sharad Malik
APVIS
2009
13 years 7 months ago
Visualization of signal transduction processes in the crowded environment of the cell
In this paper, we propose a stochastic simulation to model and analyze cellular signal transduction. The high number of objects in a simulation requires advanced visualization tec...
Martin Falk, Michael Klann, Matthias Reuss, Thomas...