Sciweavers

1129 search results - page 115 / 226
» Finding Similar Failures Using Callstack Similarity
Sort
View
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
14 years 2 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang
METRICS
2005
IEEE
14 years 1 months ago
Acceptance Issues in Metrics Program Implementation
Software process improvement initiatives such as metrics programs have a high failure rate during their assimilation in a software organization. Social and individual issues are s...
Medha Umarji, Henry Emurian
GECCO
2010
Springer
152views Optimization» more  GECCO 2010»
14 years 1 months ago
Importing the computational neuroscience toolbox into neuro-evolution-application to basal ganglia
Neuro-evolution and computational neuroscience are two scientific domains that produce surprisingly different artificial neural networks. Inspired by the “toolbox” used by ...
Jean-Baptiste Mouret, Stéphane Doncieux, Be...
ASSETS
2005
ACM
13 years 10 months ago
SmartColor: disambiguation framework for the colorblind
Failure in visual communication between the author and the colorblind reader is caused when color effects that the author expects for the reader to experience are not observed by...
Ken Wakita, Kenta Shimamura
ALMOB
2007
133views more  ALMOB 2007»
13 years 8 months ago
Characteristics of predictor sets found using differential prioritization
Background: Feature selection plays an undeniably important role in classification problems involving high dimensional datasets such as microarray datasets. For filter-based featu...
Chia Huey Ooi, Madhu Chetty, Shyh Wei Teng