Sciweavers

2663 search results - page 515 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
CCS
2006
ACM
14 years 5 days ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
GECCO
2006
Springer
170views Optimization» more  GECCO 2006»
14 years 3 days ago
How an optimal observer can collapse the search space
Many metaheuristics have difficulty exploring their search space comprehensively. Exploration time and efficiency are highly dependent on the size and the ruggedness of the search...
Christophe Philemotte, Hugues Bersini
ICSE
2000
IEEE-ACM
14 years 1 days ago
Galileo: a tool built from mass-market applications
We present Galileo, an innovative engineering modeling and analysis tool built using an approach we call packageoriented programming (POP). Galileo represents an ongoing evaluatio...
David Coppit, Kevin J. Sullivan
IEAAIE
2000
Springer
14 years 1 days ago
Maintenance of KBS's by Domain Experts: The Holy Grail in Practice
Enabling a domain expert to maintain his own knowledge in a Knowledge Based System has long been an ideal for the Knowledge Engineering community. In this paper we report on our ex...
Arne Bultmann, Joris Kuipers, Frank van Harmelen
MICCAI
2000
Springer
14 years 17 hour ago
Intraoperative Segmentation and Nonrigid Registration for Image Guided Therapy
Our goal was to improve image guidance during minimally invasive image guided therapy by developing an intraoperative segmentation and nonrigid registration algorithm. The algorith...
Simon K. Warfield, Arya Nabavi, Torsten Butz, Kema...