Sciweavers

373 search results - page 29 / 75
» Automatic Generation of Symmetry-Breaking Constraints
Sort
View
RE
2001
Springer
14 years 2 months ago
Events and Constraints: A Graphical Editor for Capturing Logic Requirements of Programs
A logic model checker can be an effective tool for debugging software applications. A stumbling block can be that model checking tools expect the user to supply a formal statement...
Margaret H. Smith, Gerard J. Holzmann, Kousha Etes...
DATE
2007
IEEE
142views Hardware» more  DATE 2007»
14 years 4 months ago
Optimizing instruction-set extensible processors under data bandwidth constraints
We present a methodology for generating optimized architectures for data bandwidth constrained extensible processors. We describe a scalable Integer Linear Programming (ILP) formu...
Kubilay Atasu, Robert G. Dimond, Oskar Mencer, Way...
AUSDM
2007
Springer
145views Data Mining» more  AUSDM 2007»
14 years 4 months ago
Discovering Frequent Sets from Data Streams with CPU Constraint
Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recogniz...
Xuan Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vince...
PRDC
2005
IEEE
14 years 3 months ago
Development of Dependable Real-Time Systems with Zerberus
Although the main fault-tolerance techniques are known for a long time, there exists no consistent approach for implementing dependable applications in the sense that the fault-to...
Christian Buckl, Alois Knoll, Gerhard Schrott
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 8 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang