Sciweavers

665 search results - page 133 / 133
» A Sub-cubic Time Algorithm for the k -Maximum Subarray Probl...
Sort
View
CCS
2006
ACM
14 years 8 days ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
AIIDE
2009
13 years 9 months ago
Demonstrating Automatic Content Generation in the Galactic Arms Race Video Game
In most modern video games, content (e.g. models, levels, weapons, etc.) shipped with the game is static and unchanging, or at best, randomized within a narrow set of parameters. ...
Erin J. Hastings, Ratan K. Guha, Kenneth O. Stanle...
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 8 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
DEDS
2008
87views more  DEDS 2008»
13 years 8 months ago
On-Line Monitoring of Large Petri Net Models Under Partial Observation
This paper deals with the on-line monitoring of large systems modeled as Petri Nets under partial observation. The plant observation is given by a subset of transitions whose occu...
George Jiroveanu, René K. Boel, Behzad Bord...
CSDA
2007
105views more  CSDA 2007»
13 years 8 months ago
Model selection for support vector machines via uniform design
The problem of choosing a good parameter setting for a better generalization performance in a learning task is the so-called model selection. A nested uniform design (UD) methodol...
Chien-Ming Huang, Yuh-Jye Lee, Dennis K. J. Lin, S...