Sciweavers

242 search results - page 24 / 49
» On the Non-sequential Nature of Domain Models of Real-number...
Sort
View
SAC
2009
ACM
14 years 3 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
SAT
2007
Springer
181views Hardware» more  SAT 2007»
14 years 2 months ago
Breaking Symmetries in SAT Matrix Models
Abstract. Symmetry occurs naturally in many computational problems. The use of symmetry breaking techniques for solving search problems reduces the search space and therefore is ex...
Inês Lynce, João P. Marques Silva
SAC
2004
ACM
14 years 1 months ago
Missing requirements and relationship discovery through proxy viewpoints model
This paper addresses the problem of “missing requirements” in software requirements specification (SRS) expressed in natural language. Due to rapid changes in technology and b...
Seok Won Lee, David C. Rine
ISORC
2005
IEEE
14 years 2 months ago
Model-Checking of Component-Based Event-Driven Real-Time Embedded Software
As complexity of real-time embedded software grows, it is desirable to use formal verification techniques to achieve a high level of assurance. We discuss application of model-ch...
Zonghua Gu, Kang G. Shin
JMLR
2012
11 years 11 months ago
Random Search for Hyper-Parameter Optimization
Grid search and manual search are the most widely used strategies for hyper-parameter optimization. This paper shows empirically and theoretically that randomly chosen trials are ...
James Bergstra, Yoshua Bengio