Sciweavers

1541 search results - page 298 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 5 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
CODES
2003
IEEE
15 years 5 months ago
Synthesis of real-time embedded software with local and global deadlines
Current methods cannot synthesize real-time embedded software applications when the global deadline of a task is shorter than the total of all local deadlines along a critical pat...
Pao-Ann Hsiung, Cheng-Yi Lin
ICCSA
2010
Springer
15 years 5 months ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi
88
Voted
BILDMED
2006
120views Algorithms» more  BILDMED 2006»
15 years 1 months ago
Towards Automatic Segmentation of Serial High-Resolution Images
Developing barley grains are to be visualised by a 4-D model, in which spatiotemporal experimental data can be integrated. The most crucial task lies in the automation of the exten...
Cornelia Brüß, Marc Strickert, Udo Seif...
IAT
2008
IEEE
15 years 15 days ago
nAble Adaptive Scaffolding Agent - Intelligent Support for Novices
Scaffolding techniques allow human instructors to support novice learners in critical early stages, and to remove that support as expertise grows. This paper describes nAble, an a...
Joseph MacInnes, Stephanie Santosa, Nathan Kronenf...