Sciweavers

22698 search results - page 4232 / 4540
» Modeling in Software Engineering
Sort
View
CCS
2007
ACM
15 years 8 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CIVR
2010
Springer
215views Image Analysis» more  CIVR 2010»
15 years 8 months ago
Multi modal semantic indexing for image retrieval
Popular image retrieval schemes generally rely only on a single mode, (either low level visual features or embedded text) for searching in multimedia databases. Many popular image...
Chandrika Pulla, C. V. Jawahar
ATAL
2006
Springer
15 years 8 months ago
Gradient field-based task assignment in an AGV transportation system
Assigning tasks to agents is complex, especially in highly dynamic environments. Typical protocol-based approaches for task assignment such as Contract Net have proven their value...
Danny Weyns, Nelis Boucké, Tom Holvoet
GECCO
2006
Springer
161views Optimization» more  GECCO 2006»
15 years 8 months ago
An empirical investigation of how and why neutrality affects evolutionary search
The effects of neutrality on evolutionary search have been considered in a number of interesting studies, the results of which, however, have been contradictory. Some researchers ...
Edgar Galván López, Riccardo Poli
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
15 years 8 months ago
Improving evolutionary real-time testing
Embedded systems are often used in a safety-critical context, e.g. in airborne or vehicle systems. Typically, timing constraints must be satisfied so that real-time embedded syste...
Marouane Tlili, Stefan Wappler, Harmen Sthamer
« Prev « First page 4232 / 4540 Last » Next »