Sciweavers

1722 search results - page 284 / 345
» Guided Genetic Programming
Sort
View
DSN
2000
IEEE
14 years 2 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
ISLPED
2000
ACM
97views Hardware» more  ISLPED 2000»
14 years 2 months ago
Achieving utility arbitrarily close to the optimal with limited energy
Energy is one of the limited resources for modern systems, especially the battery-operated devices and personal digital assistants. The backlog in new technologies for more powerf...
Gang Qu, Miodrag Potkonjak
SC
2000
ACM
14 years 2 months ago
Performance Modeling and Tuning of an Unstructured Mesh CFD Application
This paper describes performance tuning experiences with a three-dimensional unstructured grid Euler flow code from NASA, which we have reimplemented in the PETSc framework and p...
William Gropp, Dinesh K. Kaushik, David E. Keyes, ...
ICRA
1999
IEEE
146views Robotics» more  ICRA 1999»
14 years 2 months ago
Planning Tracking Motions for an Intelligent Virtual Camera
We consider the problem of automatically generating viewpoint motions for a virtual camera tracking a moving target. Given the target's trajectory, we plan the motion of a ca...
Tsai-Yen Li, Tzong-Hann Yu
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 2 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok