Sciweavers

1821 search results - page 357 / 365
» Security-Aware Program Transformations
Sort
View
GECCO
2010
Springer
230views Optimization» more  GECCO 2010»
14 years 1 months ago
Exponential natural evolution strategies
The family of natural evolution strategies (NES) offers a principled approach to real-valued evolutionary optimization by following the natural gradient of the expected fitness....
Tobias Glasmachers, Tom Schaul, Yi Sun, Daan Wiers...
EDBT
2009
ACM
156views Database» more  EDBT 2009»
14 years 1 months ago
Evaluating very large datalog queries on social networks
We consider a near future scenario in which users of a Web 2.0 application, such as a social network, contribute to the application not only data, but also rules which automatical...
Royi Ronen, Oded Shmueli
CHARME
2001
Springer
133views Hardware» more  CHARME 2001»
14 years 1 months ago
View from the Fringe of the Fringe
Formal analysis remains outside the mainstream of system design practice. Interactive methods and tools are regarded by some to be on the margin of useful research in this area. Al...
Steven D. Johnson
SAS
1999
Springer
106views Formal Methods» more  SAS 1999»
14 years 1 months ago
Translating Out of Static Single Assignment Form
Programs represented in Static Single Assignment (SSA) form contain phi instructions (or functions) whose operational semantics are to merge values coming from distinct control flo...
Vugranam C. Sreedhar, Roy Dz-Ching Ju, David M. Gi...
MPC
2010
Springer
174views Mathematics» more  MPC 2010»
14 years 23 days ago
Matrices as Arrows!
cting programs and point-free abstraction [2]. In order to automatically generate the fast running code there was the need to use matrix product as the basic matrix composition ope...
Hugo Daniel Macedo, José Nuno Oliveira