Sciweavers

1452 search results - page 49 / 291
» Algorithmic Analysis of Array-Accessing Programs
Sort
View
DMIN
2006
126views Data Mining» more  DMIN 2006»
13 years 11 months ago
Comparison and Analysis of Mutation-based Evolutionary Algorithms for ANN Parameters Optimization
Mutation-based Evolutionary Algorithms, also known as Evolutionary Programming (EP) are commonly applied to Artificial Neural Networks (ANN) parameters optimization. This paper pre...
Kristina Davoian, Alexander Reichel, Wolfram-Manfr...
INFOCOM
2005
IEEE
14 years 3 months ago
Optimal ISP subscription for Internet multihoming: algorithm design and implication analysis
— Multihoming is a popular method used by large enterprises and stub ISPs to connect to the Internet to reduce cost and improve performance. Recently researchers have studied the...
Hao Wang, Haiyong Xie 0002, Lili Qiu, Abraham Silb...
FASE
2010
Springer
14 years 4 months ago
Memory Leaks Detection in Java by Bi-abductive Inference
This paper describes a compositional analysis algorithm for statically detecting leaks in Java programs. The algorithm is based on separation logic and exploits the concept of bi-a...
Dino Distefano, Ivana Filipovic
ENTCS
2010
133views more  ENTCS 2010»
13 years 4 months ago
Inference of Session Types From Control Flow
This is a study of a technique for deriving the session type of a program written in a statically typed imperative language from its control flow. We impose on our unlabelled sess...
Peter Collingbourne, Paul H. J. Kelly
CIDR
2011
230views Algorithms» more  CIDR 2011»
13 years 1 months ago
Consistency Analysis in Bloom: a CALM and Collected Approach
Distributed programming has become a topic of widespread interest, and many programmers now wrestle with tradeoffs between data consistency, availability and latency. Distributed...
Peter Alvaro, Neil Conway, Joe Hellerstein, Willia...