Sciweavers

1821 search results - page 71 / 365
» Security-Aware Program Transformations
Sort
View
CSL
1998
Springer
15 years 6 months ago
Revision Programming = Logic Programming + Integrity Constraints
We study revision programming, a logic-based mechanism for enforcing constraints on databases. The central concept of this approach is that of a justi ed revision based on a revisi...
V. Wiktor Marek, Inna Pivkina, Miroslaw Truszczyns...
AGTIVE
2007
Springer
15 years 6 months ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe
110
Voted
ICASSP
2008
IEEE
15 years 8 months ago
Optimized distributed 2D transforms for irregularly sampled sensor network grids using wavelet lifting
We address the design and optimization of an energy-efficient lifting-based 2D transform for wireless sensor networks with irregular spatial sampling. The 2D transform is designe...
Godwin Shen, Antonio Ortega
135
Voted
LPNMR
2004
Springer
15 years 7 months ago
Towards Automated Integration of Guess and Check Programs in Answer Set Programming
Abstract. Many NP-complete problems can be encoded in the answer set semantics of logic programs in a very concise way, where the encoding reflects the typical “guess and check...
Thomas Eiter, Axel Polleres
114
Voted
ICMLA
2010
15 years 4 days ago
Robust Learning for Adaptive Programs by Leveraging Program Structure
Abstract--We study how to effectively integrate reinforcement learning (RL) and programming languages via adaptation-based programming, where programs can include non-deterministic...
Jervis Pinto, Alan Fern, Tim Bauer, Martin Erwig