Sciweavers

819 search results - page 139 / 164
» Fractal symbolic analysis
Sort
View
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 4 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
CIE
2009
Springer
14 years 4 months ago
On Stateless Multicounter Machines
We investigate the computing power of stateless multicounter machines with reversal-bounded counters. Such a machine has m-counters operating on a one-way input delimited by left a...
Ömer Egecioglu, Oscar H. Ibarra
EUROGP
2009
Springer
132views Optimization» more  EUROGP 2009»
14 years 4 months ago
A Statistical Learning Perspective of Genetic Programming
Code bloat, the excessive increase of code size, is an important issue in Genetic Programming (GP). This paper proposes a theoretical analysis of code bloat in GP from the perspec...
Nur Merve Amil, Nicolas Bredeche, Christian Gagn&e...
IFM
2009
Springer
124views Formal Methods» more  IFM 2009»
14 years 4 months ago
Dynamic Path Reduction for Software Model Checking
We present the new technique of dynamic path reduction (DPR), which allows one to prune redundant paths from the state space of a program under verification. DPR is a very general...
Zijiang Yang, Bashar Al-Rawi, Karem Sakallah, Xiao...
CEC
2008
IEEE
14 years 4 months ago
Grammatical bias and building blocks in meta-grammar Grammatical Evolution
—This paper describes and tests the utility of a meta Grammar approach to Grammatical Evolution (GE). Rather than employing a fixed grammar as is the case with canonical GE, und...
Erik Hemberg, Michael O'Neill, Anthony Brabazon