Sciweavers

1456 search results - page 186 / 292
» The Layer-Independent Descriptor Concept
Sort
View
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
15 years 3 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiļ...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
97
Voted
GECCO
2009
Springer
109views Optimization» more  GECCO 2009»
15 years 3 months ago
A genetic algorithm for learning significant phrase patterns in radiology reports
Radiologists disagree with each other over the characteristics and features of what constitutes a normal mammogram and the terminology to use in the associated radiology report. R...
Robert M. Patton, Thomas E. Potok, Barbara G. Beck...
GPCE
2009
Springer
15 years 3 months ago
Safe composition of non-monotonic features
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Martin Kuhlemann, Don S. Batory, Christian Kä...
CCS
2000
ACM
15 years 3 months ago
Composition and integrity preservation of secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown simulatability approach, i.e., the specification is an ...
Birgit Pfitzmann, Michael Waidner
ITICSE
2010
ACM
15 years 3 months ago
PhidgetLab: crossing the border from virtual to real-world objects
Teaching pupils the ideas behind objects in programming languages can be difficult since these concepts are mostly and not comprehensible at first sight. Etoys as a visual progra...
Michael Haupt, Michael Perscheid, Robert Hirschfel...