Sciweavers

5722 search results - page 933 / 1145
» Security Function Interactions
Sort
View
118
Voted
ISSTA
2006
ACM
15 years 9 months ago
Architecture-based testing using goals and plans
This paper presents a specification-based testing approach that compares software specifications defined at different f abstraction, e.g. architecture and implementation, agai...
Kristina Winbladh, Thomas A. Alspaugh, Hadar Ziv, ...
137
Voted
GECCO
2005
Springer
155views Optimization» more  GECCO 2005»
15 years 9 months ago
Mission planning for joint suppression of enemy air defenses using a genetic algorithm
In this paper we present a genetic algorithm applied to the problem of mission planning for Joint Suppression of Enemy Air Defenses (JSEAD) in support of air strike operations. Th...
Jeffrey P. Ridder, Jason C. HandUber
175
Voted
MM
2004
ACM
167views Multimedia» more  MM 2004»
15 years 9 months ago
Learning an image manifold for retrieval
We consider the problem of learning a mapping function from low-level feature space to high-level semantic space. Under the assumption that the data lie on a submanifold embedded ...
Xiaofei He, Wei-Ying Ma, HongJiang Zhang
139
Voted
GPCE
2009
Springer
15 years 8 months ago
Algorithms for user interfaces
User interfaces for modern applications must support a rich set of interactive features. It is commonplace to find applications with dependencies between values manipulated by us...
Jaakko Järvi, Mat Marcus, Sean Parent, John F...
153
Voted
APSEC
2001
IEEE
15 years 7 months ago
Orchestrating Computations on the World-Wide Web
Word processing software, email, and spreadsheet have revolutionized office activities. There are many other office tasks that are amenable to automation, such as: scheduling a vi...
Jayadev Misra, Harrick M. Vin