Sciweavers

1173 search results - page 124 / 235
» Ranking functions and rankings on languages
Sort
View
CAV
2011
Springer
207views Hardware» more  CAV 2011»
13 years 19 days ago
Interactive Synthesis of Code Snippets
Abstract. We describe a tool that applies theorem proving technology to synthesize code fragments that use given library functions. To determine candidate code fragments, our appro...
Tihomir Gvero, Viktor Kuncak, Ruzica Piskac
CAEPIA
2011
Springer
12 years 9 months ago
A Cluster Based Pseudo Feedback Technique Which Exploits Good and Bad Clusters
Abstract. In the last years, cluster based retrieval has been demonstrated as an effective tool for both interactive retrieval and pseudo relevance feedback techniques. In this pa...
Javier Parapar, Alvaro Barreiro
ECML
2007
Springer
14 years 3 months ago
Fast Optimization Methods for L1 Regularization: A Comparative Study and Two New Approaches
L1 regularization is effective for feature selection, but the resulting optimization is challenging due to the non-differentiability of the 1-norm. In this paper we compare state...
Mark Schmidt, Glenn Fung, Rómer Rosales
GECCO
2006
Springer
146views Optimization» more  GECCO 2006»
14 years 21 days ago
The dispersion metric and the CMA evolution strategy
An algorithm independent metric is introduced that measures the dispersion of a uniform random sample drawn from the top ranked percentiles of the search space. A low dispersion f...
Monte Lunacek, Darrell Whitley
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz