Sciweavers

2938 search results - page 21 / 588
» On obfuscating point functions
Sort
View
ICSM
2007
IEEE
14 years 2 months ago
Matching Control Flow of Program Versions
In many application areas, including piracy detection, software debugging and maintenance, situations arise in which there is a need for comparing two versions of a program that d...
Vijayanand Nagarajan, Rajiv Gupta, Matias Madou, X...
AMOST
2005
ACM
14 years 1 months ago
Using information about functions in selecting test cases
We consider the problem of generating a set of test cases from a black box specification. We focus on stress testing, i.e. picking test cases that seem most likely to reveal prog...
Markus Clermont, David Lorge Parnas
ICASSP
2011
IEEE
12 years 11 months ago
Ultra-fast tracking based on zero-shift points
A novel tracker based on points where the intensity function is locally even is presented. Tracking of these so called zeroshift points (ZSPs) is very efficient, a single point i...
Jan Dupac, Jiri Matas
GECCO
2004
Springer
117views Optimization» more  GECCO 2004»
14 years 1 months ago
Bistability of the Needle Function in the Presence of Truncation Selection
It is possible for a GA to have two stable fixed points on a single-peak fitness landscape. These can correspond to meta-stable finite populations. This phenomenon is called bis...
Alden H. Wright, Greg Cripe
SIAMJO
2000
88views more  SIAMJO 2000»
13 years 7 months ago
A Feasible BFGS Interior Point Algorithm for Solving Convex Minimization Problems
Abstract. We propose a BFGS primal-dual interior point method for minimizing a convex function on a convex set defined by equality and inequality constraints. The algorithm generat...
Paul Armand, Jean Charles Gilbert, Sophie Jan-J&ea...