Sciweavers

79 search results - page 14 / 16
» Theory and Techniques for Automatic Generation of Vulnerabil...
Sort
View
ISSTA
2004
ACM
14 years 2 months ago
Evolutionary testing in the presence of loop-assigned flags: a testability transformation approach
Evolutionary testing is an effective technique for automatically generating good quality test data. However, for structural testing, the technique degenerates to random testing i...
André Baresel, David Binkley, Mark Harman, ...
ICNP
2006
IEEE
14 years 2 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
CP
2005
Springer
14 years 2 months ago
Mechanism Design for Preference Aggregation over Coalitions
The aggregation of individuals’ preferences into a single group outcome is both well-studied and fundamental within decision theory. Historically, though, a pervasive simplifica...
Eric I. Hsu, Sheila A. McIlraith
MM
2009
ACM
269views Multimedia» more  MM 2009»
14 years 3 months ago
Semi-supervised topic modeling for image annotation
We propose a novel technique for semi-supervised image annotation which introduces a harmonic regularizer based on the graph Laplacian of the data into the probabilistic semantic ...
Yuanlong Shao, Yuan Zhou, Xiaofei He, Deng Cai, Hu...
GECCO
2006
Springer
218views Optimization» more  GECCO 2006»
14 years 6 days ago
Genetic programming with primitive recursion
When Genetic Programming is used to evolve arithmetic functions it often operates by composing them from a fixed collection of elementary operators and applying them to parameters...
Stefan Kahrs