Sciweavers

260 search results - page 33 / 52
» Risk and Requirements-Based Testing
Sort
View
AUSDM
2006
Springer
122views Data Mining» more  AUSDM 2006»
15 years 3 months ago
Analysis of Breast Feeding Data Using Data Mining Methods
The purpose of this study is to demonstrate the benefit of using common data mining techniques on survey data where statistical analysis is routinely applied. The statistical surv...
Hongxing He, Huidong Jin, Jie Chen, Damien McAulla...
GECCO
2005
Springer
142views Optimization» more  GECCO 2005»
15 years 5 months ago
Toward evolved flight
We present the first hardware-in-the-loop evolutionary optimization on an ornithopter. Our experiments demonstrate the feasibility of evolving flight through genetic algorithms an...
Rusty Hunt, Gregory Hornby, Jason D. Lohn
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
15 years 5 months ago
A genetic algorithm approach to the selection of near-optimal subsets from large sets
The problem attempted in this paper is to select a sample from a large set where the sample is required to have a particular average property. The problem can be expressed as an o...
P. Whiting, P. W. Poon, J. N. Carter
ICSM
2003
IEEE
15 years 5 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 4 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo