Sciweavers

552 search results - page 72 / 111
» Sources of Variability in MEG
Sort
View
GECCO
2009
Springer
166views Optimization» more  GECCO 2009»
15 years 4 months ago
Genetic programming in the wild: evolving unrestricted bytecode
We describe a methodology for evolving Java bytecode, enabling the evolution of extant, unrestricted Java programs, or programs in other languages that compile to Java bytecode. B...
Michael Orlov, Moshe Sipper
SCAM
2008
IEEE
15 years 4 months ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
ACSAC
2007
IEEE
15 years 4 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
RTSS
2007
IEEE
15 years 4 months ago
Robust Priority Assignment for Fixed Priority Real-Time Systems
This paper focuses on priority assignment for realtime systems using fixed priority scheduling. It introduces and defines the concept of a “robust” priority ordering: the most...
Robert I. Davis, Alan Burns
SIBGRAPI
2007
IEEE
15 years 4 months ago
Seed-Relative Segmentation Robustness of Watershed and Fuzzy Connectedness Approaches
This paper analyzes the robustness issue in three segmentation approaches: the iterative relative fuzzy object extraction, the watershed transforms (WT) by image foresting transfo...
Romaric Audigier, Roberto de Alencar Lotufo