Sciweavers

178 search results - page 19 / 36
» Splitting a CR-Prolog Program
Sort
View
DSN
2007
IEEE
14 years 2 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
AAAI
2007
13 years 10 months ago
Visualization and Adjustment of Evaluation Functions Based on Evaluation Values and Win Probability
We present a method of visualizing and adjusting the evaluation functions in game programming in this paper. It is widely recognized that an evaluation function should assign a hi...
Shogo Takeuchi, Tomoyuki Kaneko, Kazunori Yamaguch...
MP
2010
94views more  MP 2010»
13 years 6 months ago
MIR closures of polyhedral sets
We study the mixed-integer rounding (MIR) closures of polyhedral sets. The MIR closure of a polyhedral set is equal to its split closure and the associated separation problem is N...
Sanjeeb Dash, Oktay Günlük, Andrea Lodi
CC
2005
Springer
120views System Software» more  CC 2005»
14 years 1 months ago
Data Slicing: Separating the Heap into Independent Regions
In this paper, we present a formal description of data slicing, which is a type-directed program transformation technique that separates a program’s heap into several independent...
Jeremy Condit, George C. Necula
PLDI
2004
ACM
14 years 1 months ago
Balancing register allocation across threads for a multithreaded network processor
+ Modern network processors employ multi-threading to allow concurrency amongst multiple packet processing tasks. We studied the properties of applications running on the network p...
Xiaotong Zhuang, Santosh Pande