Sciweavers

4913 search results - page 934 / 983
» Results and Perspectives of the G
Sort
View
DSN
2004
IEEE
15 years 4 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
CLEF
2006
Springer
15 years 4 months ago
MorphoSaurus in ImageCLEF 2006: The Effect of Subwords On Biomedical IR
We here describe the subword approach we used in the 2006 ImageCLEF Medical Image Retrieval task. It is based on the assupmtion that neither fully inflected nor automatically stem...
Philipp Daumke, Jan Paetzold, Kornél G. Mar...
ESTIMEDIA
2006
Springer
15 years 4 months ago
Design of a WCET-Aware C Compiler
This paper presents techniques to tightly integrate worstcase execution time (WCET) information into a compiler framework. Currently, a tight integration of WCET information into ...
Heiko Falk, Paul Lokuciejewski, Henrik Theiling
98
Voted
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
15 years 4 months ago
Multi-step environment learning classifier systems applied to hyper-heuristics
Heuristic Algorithms (HA) are very widely used to tackle practical problems in operations research. They are simple, easy to understand and inspire confidence. Many of these HAs a...
Javier G. Marín-Blázquez, Sonia Schu...
121
Voted
CAV
2000
Springer
187views Hardware» more  CAV 2000»
15 years 4 months ago
Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking
In this paper we show how to do symbolic model checking using Boolean Expression Diagrams (BEDs), a non-canonical representation for Boolean formulas, instead of Binary Decision Di...
Poul Frederick Williams, Armin Biere, Edmund M. Cl...