Sciweavers

11182 search results - page 2151 / 2237
» Shape Analysis of Sets
Sort
View
FM
2006
Springer
146views Formal Methods» more  FM 2006»
14 years 20 days ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler
GECCO
2006
Springer
133views Optimization» more  GECCO 2006»
14 years 20 days ago
A general coarse-graining framework for studying simultaneous inter-population constraints induced by evolutionary operations
The use of genotypic populations is necessary for adaptation in Evolutionary Algorithms. We use a technique called form-invariant commutation to study the immediate effect of evol...
Keki M. Burjorjee, Jordan B. Pollack
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
14 years 18 days ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
IEAAIE
2000
Springer
14 years 18 days ago
Maintenance of KBS's by Domain Experts: The Holy Grail in Practice
Enabling a domain expert to maintain his own knowledge in a Knowledge Based System has long been an ideal for the Knowledge Engineering community. In this paper we report on our ex...
Arne Bultmann, Joris Kuipers, Frank van Harmelen
ISCA
2000
IEEE
93views Hardware» more  ISCA 2000»
14 years 17 days ago
Reconfigurable caches and their application to media processing
High performance general-purpose processors are increasingly being used for a variety of application domains scienti c, engineering, databases, and more recently, media processing...
Parthasarathy Ranganathan, Sarita V. Adve, Norman ...
« Prev « First page 2151 / 2237 Last » Next »