Sciweavers

981 search results - page 114 / 197
» Symbolic pointer analysis
Sort
View
SIGSOFT
2006
ACM
14 years 10 months ago
Lightweight extraction of syntactic specifications
A method for extracting syntactic specifications from heapmanipulating code is described. The state of the heap is represented as an environment mapping each variable or field to ...
Mana Taghdiri, Robert Seater, Daniel Jackson
DCC
2005
IEEE
14 years 9 months ago
Efficient Alphabet Partitioning Algorithms for Low-Complexity Entropy Coding
We analyze the technique for reducing the complexity of entropy coding consisting in the a priori grouping of the source alphabet symbols, and in dividing the coding process in tw...
Amir Said
ICC
2009
IEEE
119views Communications» more  ICC 2009»
14 years 4 months ago
Distributed Turbo Trellis Coded Modulation for Cooperative Communications
— In this contribution, we propose a Distributed Turbo Trellis Coded Modulation (DTTCM) scheme for cooperative communications. The DTTCM scheme is designed based on its decoding ...
Soon Xin Ng, Yonghui Li, Lajos Hanzo
TPHOL
2009
IEEE
14 years 4 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
14 years 4 months ago
An evolutionary approach to constructive induction for link discovery
This paper presents a genetic programming-based symbolic regression approach to the construction of relational features in link analysis applications. Specifically, we consider t...
Tim Weninger, William H. Hsu, Jing Xia, Waleed Alj...