Sciweavers

2752 search results - page 160 / 551
» Rounding to an Integral Program
Sort
View
IPCO
2010
153views Optimization» more  IPCO 2010»
13 years 8 months ago
An Effective Branch-and-Bound Algorithm for Convex Quadratic Integer Programming
We present a branch-and-bound algorithm for minimizing a convex quadratic objective function over integer variables subject to convex constraints. In a given node of the enumerati...
Christoph Buchheim, Alberto Caprara, Andrea Lodi
ICSE
2008
IEEE-ACM
14 years 11 months ago
SpyWare: a change-aware development toolset
Our research is driven by the motivation that change must be put in the center, if one wants to understand the complex processes of software evolution. We built a toolset named Sp...
Romain Robbes, Michele Lanza
ICASSP
2008
IEEE
14 years 4 months ago
Broadcast news subtitling system in Portuguese
The subtitling of broadcast news programs are starting to become a very interesting application due to the technological advances in Automatic Speech Recognition and associated te...
João Paulo Neto, Hugo Meinedo, Márci...
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 11 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 7 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee