Sciweavers

2642 search results - page 179 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
15 years 5 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ICC
2009
IEEE
161views Communications» more  ICC 2009»
15 years 11 months ago
Downlink OFDMA Resource Allocation Under Partial Channel State Information
Abstract— The problem of resource allocation (RA) in a downlink OFDMA system is examined under the realistic assumption of imperfect channel state information (CSI) at the base s...
Stelios Stefanatos, Nikos Dimitriou
COMPSAC
2005
IEEE
15 years 10 months ago
Parallel Changes: Detecting Semantic Interferences
Parallel changes are a basic fact of modern software development. Where previously we looked at prima facie interference, here we investigate a less direct form that we call seman...
G. Lorenzo Thione, Dewayne E. Perry
TACAS
1999
Springer
88views Algorithms» more  TACAS 1999»
15 years 9 months ago
A Theorem Prover-Based Analysis Tool for Object-Oriented Databases
We present a theorem-prover based analysis tool for object-oriented database systems with integrity constraints. Object-oriented database specifications are mapped to higher-order...
David Spelt, Susan Even
POPL
1998
ACM
15 years 9 months ago
Alias Analysis of Executable Code
Recent years have seen increasing interest in systems that reason about and manipulate executable code. Such systems can generally benefit from information about aliasing. Unfort...
Saumya K. Debray, Robert Muth, Matthew Weippert