نتایج جستجو برای: we considered

تعداد نتایج: 4761271  

1992
John J. Grefenstette

A central problem in the theory of genetic algorithms is the characterization of problems that are difficult for GAs to optimize. Many attempts to characterize such problems focus on the notion of Deception, defined in terms of the static average fitness of competing schemas. This article examines the Static Building Block Hypothesis (SBBH), the underlying assumption used to define Deception. E...

2007
Eva Hornecker

Frequently physical affordances are considered one of the main advantages of tangible interfaces or input devices, making interaction intuitive. This assumption may be overly simplistic – because physical objects have a multitude of physical affordances and properties, it is difficult for the designer to restrict these to (only) those that match with the digital system that they are connected w...

2013
Mark Allman

Networking and security researchers must grapple with the following four potential constraints in the course of their work: (i) legal issues, (ii) institutional policies, (iii) community norms and (iv) personal ethics. These possible constraints can be intertwined and inform one another. In this position paper we set aside all except the third constraint: community norms. We do not mean to dimi...

2000
John G. Cleary Mark Utting Roger Clayton

We describe an approach to logic programming where the execution of a pure logic program is ordered on “temporal” values in the program. The resulting programs are relational and avoid a premature commitment to data structures. This is a strong advantage in a programming language. We present the programming language Starlog as an example of this approach and give a summary of its denotational a...

1997
Alexander Franz

Many current approaches to statistical language modeling rely on independence a.~sumptions 1)etween the different explanatory variables. This results in models which are computationally simple, but which only model the main effects of the explanatory variables oil the response variable. This paper presents an argmnent in favor of a statistical approach that also models the interactions between ...

1999
Anthony J. H. Simons

This article traces the unstable semantics of use cases from Jacobson to UML 1.3. The UML 1.1 metamodel formally defined the «uses» and «extends» use case relationships as stereotypes of generalisation, yet both received interpretations that varied between inheritance and composition, reflecting a large degree of confusion among developers. The recently revised UML 1.3 has quietly dropped these...

Journal: :CoRR 2015
John Slaney

This report describes the development and use of an online teaching tool giving students exercises in logical modelling, or formalisation as it is called in the older literature. The original version of the site, ‘Logic for Fun’, dates from 2001, though it was little used except by small groups of students at the Australian National University. It is currently in the process of being replaced b...

Journal: :CoRR 2012
Amir Herzberg Haya Shulman

We present practical poisoning and name-server blocking attacks on standard DNS resolvers, by off-path, spoofing adversaries. Our attacks exploit large DNS responses that cause IP fragmentation; such long responses are increasingly common, mainly due to the use of DNSSEC. In common scenarios, where DNSSEC is partially or incorrectly deployed, our poisoning attacks allow ‘complete’ domain hijack...

Journal: :Software Testing, Verification and Reliability 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید