Sciweavers

1487 search results - page 200 / 298
» Two Kinds of Metonymy
Sort
View
GECCO
2000
Springer
112views Optimization» more  GECCO 2000»
14 years 18 days ago
Linguistic Rule Extraction by Genetics-Based Machine Learning
This paper shows how linguistic classification knowledge can be extracted from numerical data for pattern classification problems with many continuous attributes by genetic algori...
Hisao Ishibuchi, Tomoharu Nakashima
ICSE
2000
IEEE-ACM
14 years 17 days ago
Multiple mass-market applications as components
Truly successful models for component-based software development continue to prove elusive. One of the few is the use of operating system, database and similar programs in many sy...
David Coppit, Kevin J. Sullivan
IMS
2000
123views Hardware» more  IMS 2000»
14 years 17 days ago
Exploiting On-Chip Memory Bandwidth in the VIRAM Compiler
Many architectural ideas that appear to be useful from a hardware standpoint fail to achieve wide acceptance due to lack of compiler support. In this paper we explore the design of...
David Judd, Katherine A. Yelick, Christoforos E. K...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
14 years 17 days ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
POPL
2000
ACM
14 years 17 days ago
Resource Bound Certification
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Karl Crary, Stephanie Weirich