Sciweavers

2835 search results - page 507 / 567
» Imperfect Requirements in Software Development
Sort
View
AINA
2010
IEEE
13 years 6 months ago
Neural Network Trainer through Computer Networks
- This paper introduces a neural network training tool through computer networks. The following algorithms, such as neuron by neuron (NBN) [1][2], error back propagation (EBP), Lev...
Nam Pham, Hao Yu, Bogdan M. Wilamowski
AMCS
2011
341views Mathematics» more  AMCS 2011»
13 years 5 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica
CONSTRAINTS
2011
13 years 5 months ago
Dantzig-Wolfe decomposition and branch-and-price solving in G12
Abstract The G12 project is developing a software environment for stating and solving combinatorial problems by mapping a high-level model of the problem to an efficient combinatio...
Jakob Puchinger, Peter J. Stuckey, Mark G. Wallace...
CORR
2011
Springer
197views Education» more  CORR 2011»
13 years 1 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
CHI
2011
ACM
13 years 1 months ago
A spreadsheet-based user interface for managing plural relationships in structured data
A key feature of relational database applications is managing plural relationships—one-to-many and many-to-many— between entities. However, since it is often infeasible to ado...
Eirik Bakke, David R. Karger, Rob Miller