Sciweavers

183 search results - page 12 / 37
» Exploiting Symmetries to Test Programs
Sort
View
CONSTRAINTS
2006
120views more  CONSTRAINTS 2006»
13 years 8 months ago
Constraint Models for the Covering Test Problem
Covering arrays can be applied to the testing of software, hardware and advanced materials, and to the effects of hormone interaction on gene expression. In this paper we develop c...
Brahim Hnich, Steven David Prestwich, Evgeny Selen...
CCS
2007
ACM
14 years 18 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
GECCO
2009
Springer
145views Optimization» more  GECCO 2009»
14 years 1 months ago
Investigating and exploiting the bias of the weighted hypervolume to articulate user preferences
Optimizing the hypervolume indicator within evolutionary multiobjective optimizers has become popular in the last years. Recently, the indicator has been generalized to the weight...
Anne Auger, Johannes Bader, Dimo Brockhoff, Eckart...
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
14 years 3 months ago
Symmetry-based face pose estimation from a single uncalibrated view
In this paper, a geometric method for estimating the face pose (roll and yaw angles) from a single uncalibrated view is presented. The symmetric structure of the human face is exp...
Vinod Pathangay, Sukhendu Das, Thomas Greiner
CAD
2005
Springer
13 years 8 months ago
Precise global collision detection in multi-axis NC-machining
We introduce a new approach to the problem of collision detection in multi-axis NC-machining. Due to the directional nature (tool axis) of multi-axis NCmachining, space subdivisio...
Oleg Ilushin, Gershon Elber, Dan Halperin, Ron Wei...