Sciweavers

852 search results - page 148 / 171
» Functional Representation of Designs and Redesign Problem So...
Sort
View
ITS
2010
Springer
159views Multimedia» more  ITS 2010»
14 years 14 days ago
Optimizing Story-Based Learning: An Investigation of Student Narrative Profiles
Narrative-centered learning environments offer significant potential for creating effective learning experiences in which students actively participate in engaging story-based prob...
Seung Y. Lee, Bradford W. Mott, James C. Lester
CSFW
2010
IEEE
13 years 11 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
13 years 11 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
13 years 11 months ago
Identification of weak motifs in multiple biological sequences using genetic algorithm
Recognition of motifs in multiple unaligned sequences provides an insight into protein structure and function. The task of discovering these motifs is very challenging because mos...
Topon Kumar Paul, Hitoshi Iba
GECCO
2000
Springer
168views Optimization» more  GECCO 2000»
13 years 11 months ago
A Fault-tolerant Multicast Routing Algorithm in ATM Networks
This paper presents a genetic algorithm based method to solve the capacity and routing assignment problem arising in the design of selfhealing networks using the Virtual Path (VP)...
Sam Kwong, S. S. Chan