Sciweavers

1099 search results - page 193 / 220
» String Transformation Learning
Sort
View
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
14 years 4 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
AGILEDC
2007
IEEE
14 years 4 months ago
Establishing the Agile PMO: Managing variability across Projects and Portfolios
Our Portfolio Management Office helps to balance the demand on the firm’s resources from multiple competing and sometimes inter-dependent projects. Traditional Project/Portfolio...
Ash Tengshe, Scott Noble
IEEEICCI
2007
IEEE
14 years 3 months ago
An Image Association Model of the Brodmann Areas
The ability to associate images is the basis for learning relationships involving vision, hearing, tactile sensation, and kinetic motion. A new architecture is described that has ...
Douglas S. Greer
IPPS
2007
IEEE
14 years 3 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
GECCO
2007
Springer
172views Optimization» more  GECCO 2007»
14 years 3 months ago
Improving the human readability of features constructed by genetic programming
The use of machine learning techniques to automatically analyse data for information is becoming increasingly widespread. In this paper we examine the use of Genetic Programming a...
Matthew Smith, Larry Bull