Sciweavers

8486 search results - page 1611 / 1698
» Ordered Enumeration Method
Sort
View
GECCO
2005
Springer
14 years 3 months ago
Theme preservation and the evolution of representation
The identification of mechanisms by which constraints on phenotypic variability are tuned in nature, and the implementation of these mechanisms in Evolutionary Algorithms (EAs) ca...
Keki M. Burjorjee, Jordan B. Pollack
GECCO
2005
Springer
159views Optimization» more  GECCO 2005»
14 years 3 months ago
Using evolutionary algorithms for the unit testing of object-oriented software
As the paradigm of object orientation becomes more and more important for modern IT development projects, the demand for an automated test case generation to dynamically test obje...
Stefan Wappler, Frank Lammermann
ICANN
2005
Springer
14 years 3 months ago
Handwritten Digit Recognition with Nonlinear Fisher Discriminant Analysis
Abstract. To generalize the Fisher Discriminant Analysis (FDA) algorithm to the case of discriminant functions belonging to a nonlinear, finite dimensional function space F (Nonli...
Pietro Berkes
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
14 years 3 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
MMMACNS
2005
Springer
14 years 3 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
« Prev « First page 1611 / 1698 Last » Next »