Sciweavers

6253 search results - page 216 / 1251
» Use Case Modeling Guidelines
Sort
View
IPPS
2007
IEEE
15 years 9 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
126
Voted
GECCO
2007
Springer
193views Optimization» more  GECCO 2007»
15 years 9 months ago
Approximating covering problems by randomized search heuristics using multi-objective models
The main aim of randomized search heuristics is to produce good approximations of optimal solutions within a small amount of time. In contrast to numerous experimental results, th...
Tobias Friedrich, Nils Hebbinghaus, Frank Neumann,...
DATE
2002
IEEE
137views Hardware» more  DATE 2002»
15 years 8 months ago
Practical Instruction Set Design and Compiler Retargetability Using Static Resource Models
The design of application (-domain) specific instructionset processors (ASIPs), optimized for code size, has traditionally been accompanied by the necessity to program assembly, ...
Qin Zhao, Bart Mesman, Twan Basten
ASE
2005
102views more  ASE 2005»
15 years 3 months ago
Modular Verification of Open Features Using Three-Valued Model Checking
Feature-oriented programming organizes programs around features rather than objects, thus better supporting extensible, product-line architectures. Programming languages increasin...
Harry C. Li, Shriram Krishnamurthi, Kathi Fisler
ICASSP
2011
IEEE
14 years 7 months ago
Modeling microstructure noise using Hawkes processes
Hawkes processes are used for modeling tick-by-tick variations of a single or of a pair of asset prices. For each asset, two counting processes (with stochastic intensities) are a...
Emmanuel Bacry, Sylvain Delattre, Marc Hoffmann, J...