Sciweavers

1532 search results - page 204 / 307
» The Symbol Grounding Problem
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 8 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
SPAA
2005
ACM
15 years 10 months ago
Admission control to minimize rejections and online set cover with repetitions
We study the admission control problem in general networks. Communication requests arrive over time, and the online algorithm accepts or rejects each request while maintaining the...
Noga Alon, Yossi Azar, Shai Gutner
EOR
2007
198views more  EOR 2007»
15 years 4 months ago
Airline crew scheduling from planning to operations
Crew scheduling problems at the planning level are typically solved in two steps: first, creating working patterns, and then assigning these to individual crew. The first step is ...
Claude P. Medard, Nidhi Sawhney
ICCS
1997
Springer
15 years 8 months ago
Uncovering the Conceptual Models in Ripple Down Rules
: The need for analysis and modeling of knowledge has been espoused by many researchers as a prerequisite to building knowledge based systems (KBS). This approach has done little t...
Debbie Richards, Paul Compton
CVPR
2009
IEEE
1866views Computer Vision» more  CVPR 2009»
16 years 11 months ago
Understanding and evaluating blind deconvolution algorithms
Blind deconvolution is the recovery of a sharp version of a blurred image when the blur kernel is unknown. Recent algorithms have afforded dramatic progress, yet many aspects of...
Anat Levin, Yair Weiss, Frédo Durand, Willi...