Sciweavers

386 search results - page 56 / 78
» Modeling Intrusion Detection Systems Using Linear Genetic Pr...
Sort
View
ICFEM
2007
Springer
14 years 17 days ago
Automating Refinement Checking in Probabilistic System Design
Abstract. Refinement plays a crucial role in "top-down" styles of verification, such as the refinement calculus, but for probabilistic systems proof of refinement is a pa...
Carlos Gonzalia, Annabelle McIver
INFORMS
2010
145views more  INFORMS 2010»
13 years 7 months ago
An Automated Intensity-Modulated Radiation Therapy Planning System
We design and implement an intensity-modulated radiation therapy (IMRT) plan generation technology that effectively and efficiently optimizes beam geometry as well as beam intens...
Shabbir Ahmed, Ozan Gozbasi, Martin W. P. Savelsbe...
POPL
2010
ACM
14 years 6 months ago
Dependent Types from Counterexamples
d by recent research in abstract model checking, we present a new approach to inferring dependent types. Unlike many of the existing approaches, our approach does not rely on prog...
Tachio Terauchi
KDD
2000
ACM
129views Data Mining» more  KDD 2000»
14 years 8 days ago
Evolutionary algorithms in data mining: multi-objective performance modeling for direct marketing
Predictive models in direct marketing seek to identify individuals most likely to respond to promotional solicitations or other intervention programs. While standard modeling appr...
Siddhartha Bhattacharyya
RAID
2010
Springer
13 years 7 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...