Sciweavers

1821 search results - page 71 / 365
» Security-Aware Program Transformations
Sort
View
CSL
1998
Springer
14 years 1 months ago
Revision Programming = Logic Programming + Integrity Constraints
We study revision programming, a logic-based mechanism for enforcing constraints on databases. The central concept of this approach is that of a justi ed revision based on a revisi...
V. Wiktor Marek, Inna Pivkina, Miroslaw Truszczyns...
AGTIVE
2007
Springer
14 years 29 days ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe
ICASSP
2008
IEEE
14 years 3 months ago
Optimized distributed 2D transforms for irregularly sampled sensor network grids using wavelet lifting
We address the design and optimization of an energy-efficient lifting-based 2D transform for wireless sensor networks with irregular spatial sampling. The 2D transform is designe...
Godwin Shen, Antonio Ortega
LPNMR
2004
Springer
14 years 2 months ago
Towards Automated Integration of Guess and Check Programs in Answer Set Programming
Abstract. Many NP-complete problems can be encoded in the answer set semantics of logic programs in a very concise way, where the encoding reflects the typical “guess and check...
Thomas Eiter, Axel Polleres
ICMLA
2010
13 years 6 months ago
Robust Learning for Adaptive Programs by Leveraging Program Structure
Abstract--We study how to effectively integrate reinforcement learning (RL) and programming languages via adaptation-based programming, where programs can include non-deterministic...
Jervis Pinto, Alan Fern, Tim Bauer, Martin Erwig