Sciweavers

1359 search results - page 50 / 272
» Black-Box Program Specialization
Sort
View
ENTCS
2008
150views more  ENTCS 2008»
13 years 8 months ago
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to st...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
SIAMJO
2008
93views more  SIAMJO 2008»
13 years 8 months ago
Stochastic Programs with First-Order Dominance Constraints Induced by Mixed-Integer Linear Recourse
We propose a new class of stochastic integer programs whose special features are dominance constraints induced by mixed-integer linear recourse. For these models, we establish clo...
Ralf Gollmer, Frederike Neise, Rüdiger Schult...
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
14 years 3 months ago
Pedagogy and Overview of a Graduate Program in Digital Investigation Management
Although still a relatively new undergraduate course of study at most colleges and universities, specialized degree programs in computer forensics and digital investigations are n...
Gary C. Kessler, Don Haggerty
GPCE
2005
Springer
14 years 2 months ago
Optimizing Marshalling by Run-Time Program Generation
Saving the internal data of an application in an external form is called marshalling. A generic marshaller is difficult to optimize because the format of the data that will be mars...
Baris Aktemur, Joel Jones, Samuel N. Kamin, Lars C...
HCW
1998
IEEE
14 years 29 days ago
Heterogeneous Programming with Java: Gourmet Blend or Just a Hill of Beans?
The heterogeneous parallel processing community has long been struggling to bring its approach to computation into the mainstream. One major impediment is that no popular programm...
Charles C. Weems