Sciweavers

2938 search results - page 21 / 588
» On obfuscating point functions
Sort
View
ICSM
2007
IEEE
15 years 9 months ago
Matching Control Flow of Program Versions
In many application areas, including piracy detection, software debugging and maintenance, situations arise in which there is a need for comparing two versions of a program that d...
Vijayanand Nagarajan, Rajiv Gupta, Matias Madou, X...
AMOST
2005
ACM
15 years 8 months ago
Using information about functions in selecting test cases
We consider the problem of generating a set of test cases from a black box specification. We focus on stress testing, i.e. picking test cases that seem most likely to reveal prog...
Markus Clermont, David Lorge Parnas
ICASSP
2011
IEEE
14 years 6 months ago
Ultra-fast tracking based on zero-shift points
A novel tracker based on points where the intensity function is locally even is presented. Tracking of these so called zeroshift points (ZSPs) is very efficient, a single point i...
Jan Dupac, Jiri Matas
GECCO
2004
Springer
117views Optimization» more  GECCO 2004»
15 years 8 months ago
Bistability of the Needle Function in the Presence of Truncation Selection
It is possible for a GA to have two stable fixed points on a single-peak fitness landscape. These can correspond to meta-stable finite populations. This phenomenon is called bis...
Alden H. Wright, Greg Cripe
SIAMJO
2000
88views more  SIAMJO 2000»
15 years 2 months ago
A Feasible BFGS Interior Point Algorithm for Solving Convex Minimization Problems
Abstract. We propose a BFGS primal-dual interior point method for minimizing a convex function on a convex set defined by equality and inequality constraints. The algorithm generat...
Paul Armand, Jean Charles Gilbert, Sophie Jan-J&ea...