Sciweavers

2686 search results - page 297 / 538
» Using a neural network in the software testing process
Sort
View
NSDI
2004
15 years 5 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
134
Voted
ICIP
1999
IEEE
16 years 5 months ago
Integrating Stereo and Shape from Shading
This paper presents a new method for integrating di erent low level vision modules, stereo and shape from shading, in order to improve the 3D reconstruction of visible surfaces of...
Mostafa G.-H. Mostafa, Sameh M. Yamany, Aly A. Far...
KES
2005
Springer
15 years 9 months ago
Fuzzy Logic and Neuro-fuzzy Modelling of Diesel Spray Penetration
: The aim of this study was to demonstrate the effectiveness of an adaptive neuro-fuzzy inference system (ANFIS) for the prediction of diesel spray penetration length in the cylind...
Shaun H. Lee, Robert J. Howlett, Simon D. Walters,...
IFIP3
1998
130views Education» more  IFIP3 1998»
15 years 5 months ago
A Platform for the Implementation of the Services of an Educational Network
Multimedia and hypermedia had and still have a tremendous impact on the evolution of educational software. In this paper we propose a platform for the implementation of the servic...
Christos Bouras, Apostolos Gkamas
EUROSYS
2006
ACM
16 years 1 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...