Sciweavers

10899 search results - page 2009 / 2180
» The GP Programming System
Sort
View
CEC
2010
IEEE
13 years 8 months ago
Implementing an intuitive mutation operator for interactive evolutionary 3D design
Abstract— Locality - how well neighbouring genotypes correspond to neighbouring phenotypes - has been described as a key element in Evolutionary Computation. Grammatical Evolutio...
Jonathan Byrne, James McDermott, Edgar Galvá...
CCS
2010
ACM
13 years 8 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
COMPSAC
2008
IEEE
13 years 8 months ago
Superfit Combinational Elusive Bug Detection
Software that has been well tested and analyzed may fail unpredictably when a certain combination of conditions occurs. In Bounded Exhaustive Testing (BET) all combinations are te...
R. Barzin, S. Fukushima, William E. Howden, S. Sha...
FCCM
2008
IEEE
176views VLSI» more  FCCM 2008»
13 years 8 months ago
The Effectiveness of Configuration Merging in Point-to-Point Networks for Module-based FPGA Reconfiguration
Communications infrastructure for modular reconfiguration of FPGAs needs to support the changing communications interfaces of a sequence of modules. In order to avoid the overhead...
Shannon Koh, Oliver Diessel
AAMAS
2008
Springer
13 years 8 months ago
Technology diffusion: analysing the diffusion of agent technologies
Despite several examples of deployed agent systems, there remain barriers to the large-scale adoption of agent technologies. In order to understand these barriers, this paper consi...
Jez McKean, Hayden Shorter, Michael Luck, Peter Mc...
« Prev « First page 2009 / 2180 Last » Next »