Sciweavers

998 search results - page 46 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
ATMOS
2007
138views Optimization» more  ATMOS 2007»
13 years 9 months ago
A new concept of robustness
In this paper a new concept of robustness is introduced and the corresponding optimization problem is stated. This new concept is applied to transportation network designs in which...
Ricardo García, Ángel Marín, ...
ACL
2004
13 years 9 months ago
Minimal Recursion Semantics as Dominance Constraints: Translation, Evaluation, and Analysis
We show that a practical translation of MRS descriptions into normal dominance constraints is feasible. We start from a recent theoretical translation and verify its assumptions o...
Ruth Fuchss, Alexander Koller, Joachim Niehren, St...
FMICS
2010
Springer
13 years 7 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó
ICSE
2007
IEEE-ACM
14 years 7 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
KDD
2004
ACM
624views Data Mining» more  KDD 2004»
14 years 29 days ago
Programming the K-means clustering algorithm in SQL
Using SQL has not been considered an efficient and feasible way to implement data mining algorithms. Although this is true for many data mining, machine learning and statistical a...
Carlos Ordonez