Sciweavers

1821 search results - page 335 / 365
» Security-Aware Program Transformations
Sort
View
ASWEC
2010
IEEE
13 years 9 months ago
Non-Monotonic Model Completion in Web Application Engineering
—Formal models are often used to verify systems and prove their correctness, and ensure that transformed models remain consistent to the original system. However, formal techniqu...
Jevon M. Wright, Jens Dietrich
CEC
2010
IEEE
13 years 9 months ago
Implementing an intuitive mutation operator for interactive evolutionary 3D design
Abstract— Locality - how well neighbouring genotypes correspond to neighbouring phenotypes - has been described as a key element in Evolutionary Computation. Grammatical Evolutio...
Jonathan Byrne, James McDermott, Edgar Galvá...
GLOBECOM
2008
IEEE
13 years 9 months ago
Energy Efficient Estimation of Gaussian Sources over Inhomogeneous Gaussian MAC Channels
In this paper, we first provide a joint source and channel coding (JSCC) approach in estimating Gaussian sources over Gaussian MAC channels, as well as its sufficient and necessary...
Shuangqing Wei, Rajgopal Kannan, S. Sitharama Iyen...
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 9 months ago
Bin Packing via Discrepancy of Permutations
A well studied special case of bin packing is the 3-partition problem, where n items of size > 1 4 have to be packed in a minimum number of bins of capacity one. The famous Kar...
Friedrich Eisenbrand, Dömötör P&aac...
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 8 months ago
Graph-Based Decoding in the Presence of ISI
We propose a new graph representation for ISI channels that can be used for combined equalization and decoding by linear programming (LP) or iterative message-passing (IMP) decodi...
Mohammad H. Taghavi, Paul H. Siegel