Sciweavers

1560 search results - page 31 / 312
» Order Functions and Evaluation Codes
Sort
View
CSFW
1999
IEEE
14 years 1 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
JFP
2000
163views more  JFP 2000»
13 years 8 months ago
Automatic useless-code elimination for HOT functional programs
In this paper we present two type inference systems for detecting useless-code in higher-order typed functional programs. Type inference can be performed in an efficient and compl...
Ferruccio Damiani, Paola Giannini
CP
2000
Springer
14 years 10 days ago
Expressiveness of Full First Order Constraints in the Algebra of Finite or Infinite Trees
We are interested in the expressiveness of constraints represented by general first order formulae, with equality as unique relation symbol and function symbols taken from an infi...
Alain Colmerauer, Thi-Bich-Hanh Dao
FBIT
2007
IEEE
14 years 3 months ago
Developmental Evaluation in Genetic Programming: A Position Paper
—Standard genetic programming genotypes are generally highly disorganized and poorly structured, with little code replication. This is also true of existing developmental genetic...
Tuan Hao Hoang, Robert I. McKay, Daryl Essam, Nguy...
ECAL
2005
Springer
14 years 2 months ago
The Genetic Coding Style of Digital Organisms
Recently, all the human genes were identified. But understanding the functions coded in the genes is of course a much harder problem. We are used to view DNA as some sort of a comp...
Philip Gerlee, Torbjörn Lundh