Sciweavers

1016 search results - page 49 / 204
» Explore or Exploit
Sort
View
CEC
2008
IEEE
14 years 3 months ago
High-level synthesis with multi-objective genetic algorithm: A comparative encoding analysis
— The high-level synthesis process involves three interdependent and NP-complete optimization problems: (i) the operation scheduling, (ii) the resource allocation, and (iii) the ...
Christian Pilato, Daniele Loiacono, Fabrizio Ferra...
ASM
2005
ASM
14 years 2 months ago
Modeling and Testing Hierarchical GUIs
Abstract. This paper presents a new approach to model and test hierarchical Graphical User Interfaces (GUIs). We exploit the structure of Hierarchical Finite State Machines (HFSMs)...
Ana Paiva, Nikolai Tillmann, João C. P. Far...
ASPLOS
2006
ACM
14 years 3 months ago
Automatic generation of peephole superoptimizers
Peephole optimizers are typically constructed using human-written pattern matching rules, an approach that requires expertise and time, as well as being less than systematic at ex...
Sorav Bansal, Alex Aiken
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
LREC
2008
113views Education» more  LREC 2008»
13 years 10 months ago
Subdomain Sensitive Statistical Parsing using Raw Corpora
Modern statistical parsers are trained on large annotated corpora (treebanks). These treebanks usually consist of sentences addressing different subdomains (e.g. sports, politics,...
Barbara Plank, Khalil Sima'an