Sciweavers

1140 search results - page 163 / 228
» Progress on Certifying Algorithms
Sort
View
CAV
2004
Springer
108views Hardware» more  CAV 2004»
14 years 3 months ago
DPLL( T): Fast Decision Procedures
The logic of equality with uninterpreted functions (EUF) and its extensions have been widely applied to processor verification, by means of a large variety of progressively more s...
Harald Ganzinger, George Hagen, Robert Nieuwenhuis...
GECCO
2004
Springer
212views Optimization» more  GECCO 2004»
14 years 3 months ago
An Evolutionary Autonomous Agent with Visual Cortex and Recurrent Spiking Columnar Neural Network
Spiking neural networks are computationally more powerful than conventional artificial neural networks. Although this fact should make them especially desirable for use in evoluti...
Rich Drewes, James B. Maciokas, Sushil J. Louis, P...
PPSN
2004
Springer
14 years 3 months ago
Experimental Supplements to the Theoretical Analysis of EAs on Problems from Combinatorial Optimization
It is typical for the EA community that theory follows experiments. Most theoretical approaches use some model of the considered evolutionary algorithm (EA) but there is also some ...
Patrick Briest, Dimo Brockhoff, Bastian Degener, M...
ACSAC
2003
IEEE
14 years 3 months ago
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Nathan Carey, George M. Mohay, Andrew Clark
AINA
2003
IEEE
14 years 3 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung