Sciweavers

1821 search results - page 162 / 365
» Security-Aware Program Transformations
Sort
View
SIGSOFT
2010
ACM
13 years 7 months ago
A trace simplification technique for effective debugging of concurrent programs
Concurrent programs are notoriously difficult to debug. We see two main reasons for this: 1) concurrency bugs are often difficult to reproduce, 2) traces of buggy concurrent execu...
Nicholas Jalbert, Koushik Sen
GLOBECOM
2008
IEEE
14 years 3 months ago
Power Allocation in Wireless Relay Networks: A Geometric Programming-Based Approach
—1 In this paper, we consider an amplify-and-forward (AF) wireless relay system where multiple source nodes communicate with their corresponding destination nodes with the help o...
Khoa T. Phan, Tho Le-Ngoc, Sergiy A. Vorobyov, Chi...
CPAIOR
2004
Springer
14 years 2 months ago
Super Solutions in Constraint Programming
To improve solution robustness, we introduce the concept of super solutions to constraint programming. An (a, b)-super solution is one in which if a variables lose their values, th...
Emmanuel Hebrard, Brahim Hnich, Toby Walsh
TAPSOFT
1991
Springer
14 years 21 days ago
Comparative Semantics for a Real-Time Programming Language with Integration
An operational and a denotational semantic model are presented for a real-time programming language incorporating the concept of integration. This concept of integration, which ha...
Franck van Breugel
FLAIRS
2008
13 years 11 months ago
Using Genetic Programming to Increase Rule Quality
Rule extraction is a technique aimed at transforming highly accurate opaque models like neural networks into comprehensible models without losing accuracy. G-REX is a rule extract...
Rikard König, Ulf Johansson, Lars Niklasson