Sciweavers

418 search results - page 69 / 84
» An Experiment in Inspecting the Quality of Use Case Descript...
Sort
View
LCN
2005
IEEE
14 years 1 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
SIGSOFT
2005
ACM
14 years 1 months ago
Reuse and variability in large software applications
Reuse has always been a major goal in software engineering, since it promises large gains in productivity, quality and time to market reduction. Practical experience has shown tha...
Jacky Estublier, Germán Vega
DAS
2004
Springer
14 years 1 months ago
Automatic Fax Routing
Abstract. We present a system for automatic FAX routing which processes incoming FAX images and forwards them to the correct email alias. The system first performs optical charact...
Paul A. Viola, James Rinker, Martin Law
GECCO
2009
Springer
124views Optimization» more  GECCO 2009»
14 years 8 days ago
Reinforcement learning for games: failures and successes
We apply CMA-ES, an evolution strategy with covariance matrix adaptation, and TDL (Temporal Difference Learning) to reinforcement learning tasks. In both cases these algorithms se...
Wolfgang Konen, Thomas Bartz-Beielstein
SIGMOD
1999
ACM
101views Database» more  SIGMOD 1999»
13 years 12 months ago
Join Synopses for Approximate Query Answering
In large data warehousing environments, it is often advantageous to provide fast, approximate answers to complex aggregate queries based on statistical summaries of the full data....
Swarup Acharya, Phillip B. Gibbons, Viswanath Poos...