Sciweavers

4998 search results - page 890 / 1000
» The case for intentional networking
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 10 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
ICA
2010
Springer
13 years 10 months ago
Use of Prior Knowledge in a Non-Gaussian Method for Learning Linear Structural Equation Models
Abstract. We discuss causal structure learning based on linear structural equation models. Conventional learning methods most often assume Gaussianity and create many indistinguish...
Takanori Inazumi, Shohei Shimizu, Takashi Washio
GECCO
2008
Springer
158views Optimization» more  GECCO 2008»
13 years 10 months ago
Structure and parameter estimation for cell systems biology models
In this work we present a new methodology for structure and parameter estimation in cell systems biology modelling. Our modelling framework is based on P systems, an unconl comput...
Francisco José Romero-Campero, Hongqing Cao...
GECCO
2008
Springer
172views Optimization» more  GECCO 2008»
13 years 10 months ago
Empirical analysis of a genetic algorithm-based stress test technique
Evolutionary testing denotes the use of evolutionary algorithms, e.g., Genetic Algorithms (GAs), to support various test automation tasks. Since evolutionary algorithms are heuris...
Vahid Garousi
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
13 years 10 months ago
Towards memoryless model building
Probabilistic model building methods can render difficult problems feasible by identifying and exploiting dependencies. They build a probabilistic model from the statistical prope...
David Iclanzan, Dumitru Dumitrescu