Sciweavers

2189 search results - page 267 / 438
» A Graded Applicability of Rules
Sort
View
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
14 years 1 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
WCRE
1998
IEEE
14 years 1 months ago
Type Inference for COBOL Systems
Types are a good starting point for various software reengineering tasks. Unfortunately, programs requiring reengineering most desperately are written in languages without an adeq...
Arie van Deursen, Leon Moonen
ISLPED
1998
ACM
69views Hardware» more  ISLPED 1998»
14 years 1 months ago
A unified approach in the analysis of latches and flip-flops for low-power systems
In this paper we propose a set of rules for consistent estimation of the real performance and power features of the latch and flip-flop structures. A new simulation and optimizati...
Vladimir Stojanovic, Vojin G. Oklobdzija, Raminder...
EPS
1998
Springer
14 years 1 months ago
Evolving Heuristics for Planning
Abstract. In this paper we describe EvoCK, a new approach to the application of genetic programming (GP) to planning. This approach starts with a traditional AI planner (PRODIGY)an...
Ricardo Aler, Daniel Borrajo, Pedro Isasi
KES
1998
Springer
14 years 1 months ago
Hidden partitioning of a visual feedback-based neuro-controller
Robotic controllers take advantage from neural network learning capabilities as long as the dimensionality of the problem is kept moderate. This paper explores the possibilities of...
Jean-Philippe Urban, Jean-Luc Buessler, Julien Gre...