Sciweavers

1821 search results - page 85 / 365
» Security-Aware Program Transformations
Sort
View
ISSAC
1995
Springer
86views Mathematics» more  ISSAC 1995»
14 years 16 days ago
Programs for Applying Symmetries
In this paper the programs APPLYSYM, QUASILINPDE and DETRAFO are described which aim at the utilization of infinitesimal symmetries of differential equations. The purpose of QUA...
Thomas Wolf
IASTEDSEA
2004
13 years 10 months ago
Instance orientation: A programming methodology
Instance orientation is an approach for designing and programming software systems. It addresses a limitation of current software architectures: it allows multiple higherlevel vie...
Thomas Schöbel-Theuer
GECCO
2005
Springer
129views Optimization» more  GECCO 2005»
14 years 2 months ago
Search space modulation in genetic algorithms: evolving the search space by sinusoidal transformations
An experimental form of Modulation (Reinterpretation) of the Search Space is presented. This modulation is developed as a mathematical method that can be implemented directly into...
José Antonio Martin H.
CC
2001
Springer
131views System Software» more  CC 2001»
14 years 1 months ago
Compiler Transformation of Pointers to Explicit Array Accesses in DSP Applications
Abstract. Efficient implementation of DSP applications are critical for embedded systems. However, current applications written in C, make extensive use of pointer arithmetic maki...
Björn Franke, Michael F. P. O'Boyle
NIPS
2004
13 years 10 months ago
Nonparametric Transforms of Graph Kernels for Semi-Supervised Learning
We present an algorithm based on convex optimization for constructing kernels for semi-supervised learning. The kernel matrices are derived from the spectral decomposition of grap...
Xiaojin Zhu, Jaz S. Kandola, Zoubin Ghahramani, Jo...