Sciweavers

1058 search results - page 142 / 212
» It's Doomed; We Can Prove It
Sort
View
GECCO
2006
Springer
174views Optimization» more  GECCO 2006»
14 years 1 months ago
On the analysis of the (1+1) memetic algorithm
Memetic algorithms are evolutionary algorithms incorporating local search to increase exploitation. This hybridization has been fruitful in countless applications. However, theory...
Dirk Sudholt
FM
2008
Springer
192views Formal Methods» more  FM 2008»
13 years 11 months ago
CoVaC: Compiler Validation by Program Analysis of the Cross-Product
Abstract. The paper presents a deductive framework for proving program equivalence and its application to automatic verification of transformations performed by optimizing compiler...
Anna Zaks, Amir Pnueli
PLANX
2007
13 years 11 months ago
XPath Typing Using a Modal Logic with Converse for Finite Trees
We present an algorithm to solve XPath decision problems under regular tree type constraints and show its use to statically typecheck XPath queries. To this end, we prove the deci...
Pierre Genevès, Nabil Layaïda, Alan Sc...
FLAIRS
2004
13 years 11 months ago
Multimodal Function Optimization Using Local Ruggedness Information
In multimodal function optimization, niching techniques create diversification within the population, thus encouraging heterogeneous convergence. The key to the effective diversif...
Jian Zhang 0007, Xiaohui Yuan, Bill P. Buckles
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 11 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim