Sciweavers

391 search results - page 75 / 79
» Computational Challenges in Cell Simulation: A Software Engi...
Sort
View
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 29 days ago
Evolutionary testing of state-based programs
The application of Evolutionary Algorithms to structural test data generation, known as Evolutionary Testing, has to date largely focused on programs with input-output behavior. H...
Phil McMinn, Mike Holcombe
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
IUI
2004
ACM
14 years 27 days ago
What role can adaptive support play in an adaptable system?
As computer applications become larger with every new version, there is a growing need to provide some way for users to manage the interface complexity. There are three different ...
Andrea Bunt, Cristina Conati, Joanna McGrenere
SIMPRA
2011
13 years 2 months ago
Virtual segment: Store-carry-forward relay-based support for wide-area non-real-time data exchange
—In the Internet of the future, a flexible, dynamic combination of wireless and wired access networks is expected to be a key driver for enlarging the broadband communication se...
Shinya Yamamura, Akira Nagata, Masato Tsuru, Hitom...
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher