Sciweavers

4218 search results - page 34 / 844
» Complete sets of cooperations
Sort
View
CSFW
2006
IEEE
14 years 1 months ago
On the Completeness of Attack Mutation Algorithms
An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances by repeatedly applying attack transformations. Such algorithms are ...
Shai Rubin, Somesh Jha, Barton P. Miller
WSCG
2001
104views more  WSCG 2001»
13 years 9 months ago
Virtual Environment for Cooperative Assistance in Teleoperation
- In order to help the user to accomplish a task, teleoperation systems have to integrate different tools such as visualization, divers interaction devices, planning tools, etc......
Olivier Heguy, Nancy Rodriguez, Hervé Luga,...
AMAST
2008
Springer
13 years 9 months ago
Towards an Efficient Implementation of Tree Automata Completion
Term Rewriting Systems (TRSs) are now commonly used as a modeling language for applications. In those rewriting based models, reachability analysis, i.e. proving or disproving that...
Emilie Balland, Yohan Boichut, Thomas Genet, Pierr...
ICPR
2008
IEEE
14 years 2 months ago
Face recognition using Complete Fuzzy LDA
In this paper, we propose a novel method for feature extraction and recognition, namely, Complete Fuzzy LDA (CFLDA). CFLDA combines the complete LDA and fuzzy set theory. CFLDA re...
Wankou Yang, Hui Yan, Jianguo Wang, Jingyu Yang
ISPASS
2003
IEEE
14 years 27 days ago
Complete instrumentation requirements for performance analysis of Web based technologies
In this paper we present the eDragon environment, a research platform created to perform complete performance analysis of new Web-based technologies. eDragon enables the understan...
David Carrera, Jordi Guitart, Jordi Torres, Eduard...