Sciweavers

13026 search results - page 2324 / 2606
» Probabilistic Relational Models
Sort
View
ETRICS
2006
15 years 8 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
141
Voted
EWCBR
2006
Springer
15 years 8 months ago
Case-Based Reasoning for Knowledge-Intensive Template Selection During Text Generation
The present paper describes a case-based reasoning solution for solving the task of selecting adequate templates for realizing messages describing actions in a given domain. This s...
Raquel Hervás, Pablo Gervás
145
Voted
FM
2006
Springer
126views Formal Methods» more  FM 2006»
15 years 8 months ago
Towards Modularized Verification of Distributed Time-Triggered Systems
Abstract. The correctness of a system according to a given specification is essential, especially for safety-critical applications. One such typical application domain is the autom...
Jewgenij Botaschanjan, Alexander Gruler, Alexander...
FOSSACS
2006
Springer
15 years 8 months ago
A Logic of Reachable Patterns in Linked Data-Structures
We define a new decidable logic for expressing and checking invariants of programs that manipulate dynamically-allocated objects via pointers and destructive pointer updates. The ...
Greta Yorsh, Alexander Moshe Rabinovich, Mooly Sag...
GECCO
2006
Springer
123views Optimization» more  GECCO 2006»
15 years 8 months ago
Fluctuating crosstalk, deterministic noise, and GA scalability
This paper extends previous work showing how fluctuating crosstalk in a deterministic fitness function introduces noise into genetic algorithms. In that work, we modeled fluctuati...
Paul Winward, David E. Goldberg
« Prev « First page 2324 / 2606 Last » Next »