Sciweavers

495 search results - page 50 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
ICDAR
2009
IEEE
14 years 9 months ago
Learning on the Fly: Font-Free Approaches to Difficult OCR Problems
Despite ubiquitous claims that optical character recognition (OCR) is a "solved problem," many categories of documents continue to break modern OCR software such as docu...
Andrew Kae, Erik G. Learned-Miller
IFIP
2004
Springer
15 years 5 months ago
Efficient Algorithms for Handling Molecular Weighted Sequences
Abstract In this paper we introduce the Weighted Suffix Tree, an efficient data structure for computing string regularities in weighted sequences of molecular data. Molecular Wei...
Costas S. Iliopoulos, Christos Makris, Yannis Pana...
RE
2001
Springer
15 years 4 months ago
Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model
Evolutionary prototyping focuses on gathering a correct and consistent set of requirements. The process lends particular strength to building quality software by means of the ongo...
Ryan A. Carter, Annie I. Antón, Laurie A. W...
TEC
2008
99views more  TEC 2008»
14 years 11 months ago
A Drug Candidate Design Environment Using Evolutionary Computation
Abstract-- This article describes the Candidate Design Environment we developed for efficient identification of promising drug candidates. Developing effective drugs from active mo...
M. Ihsan Ecemis, J. Wikel, C. Bingham, Eric Bonabe...
EUROPAR
2006
Springer
15 years 3 months ago
Model-Based Performance Diagnosis of Master-Worker Parallel Computations
Parallel performance tuning naturally involves a diagnosis process to locate and explain sources of program inefficiency. Proposed is an approach that exploits parallel computation...
Li Li, Allen D. Malony