Sciweavers

1084 search results - page 96 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
ISSTA
2009
ACM
15 years 10 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
PAAPP
2002
76views more  PAAPP 2002»
15 years 3 months ago
Performance of PDE solvers on a self-optimizing NUMA architecture
Abstract. The performance of shared-memory (OpenMP) implementations of three different PDE solver kernels representing finite difference methods, finite volume methods, and spectra...
Sverker Holmgren, Markus Nordén, Jarmo Rant...
145
Voted
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003
GECCO
2003
Springer
130views Optimization» more  GECCO 2003»
15 years 9 months ago
Extracting Test Sequences from a Markov Software Usage Model by ACO
The aim of the paper is to investigate methods for deriving a suitable set of test paths for a software system. The design and the possible uses of the software system are modelled...
Karl Doerner, Walter J. Gutjahr
GECCO
2009
Springer
137views Optimization» more  GECCO 2009»
15 years 8 months ago
Efficient natural evolution strategies
Efficient Natural Evolution Strategies (eNES) is a novel alternative to conventional evolutionary algorithms, using the natural gradient to adapt the mutation distribution. Unlike...
Yi Sun, Daan Wierstra, Tom Schaul, Jürgen Sch...