Sciweavers

5757 search results - page 1046 / 1152
» Dynamic Policy Programming
Sort
View
IJISEC
2006
106views more  IJISEC 2006»
13 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
COR
2007
87views more  COR 2007»
13 years 9 months ago
An exact algorithm for generating homogenous T-shape cutting patterns
Both the material usage and the complexity of the cutting process should be considered in generating cutting patterns. This paper presents an exact algorithm for constrained two-d...
Yaodong Cui
COR
2007
97views more  COR 2007»
13 years 9 months ago
Two-stage general block patterns for the two-dimensional cutting problem
This paper presents an algorithm for the unconstrained two-dimensional cutting problem of rectangular pieces. It proposes the two-stage general block pattern that can be cut into ...
Yaodong Cui, Xianquan Zhang
JCC
2006
82views more  JCC 2006»
13 years 9 months ago
Monte Carlo simulations of biomolecules: The MC module in CHARMM
: We describe the implementation of a general and flexible Monte Carlo (MC) module for the program CHARMM, which is used widely for modeling biomolecular systems with empirical ene...
Jie Hu, Ao Ma, Aaron R. Dinner
JMLR
2006
120views more  JMLR 2006»
13 years 9 months ago
Kernel-Based Learning of Hierarchical Multilabel Classification Models
We present a kernel-based algorithm for hierarchical text classification where the documents are allowed to belong to more than one category at a time. The classification model is...
Juho Rousu, Craig Saunders, Sándor Szedm&aa...
« Prev « First page 1046 / 1152 Last » Next »