Sciweavers

ICASSP
2011
IEEE
12 years 8 months ago
Compressed learning of high-dimensional sparse functions
This paper presents a simple randomised algorithm for recovering high-dimensional sparse functions, i.e. functions f : [0, 1]d → R which depend effectively only on k out of d va...
Karin Schnass, Jan Vybíral
JSAC
2010
122views more  JSAC 2010»
13 years 2 months ago
Scalable service migration in autonomic network environments
Abstract— Service placement is a key problem in communication networks as it determines how efficiently the user service demands are supported. This problem has been traditional...
Konstantinos Oikonomou, Ioannis Stavrakakis
AUTOMATICA
2004
91views more  AUTOMATICA 2004»
13 years 4 months ago
Comparing digital implementation via the bilinear and step-invariant transformations
From an analog system K, digital systems Kd and Kbt are often obtained via the step-invariant and bilinear transformations, respectively. For the case when K is stable, it is show...
Guofeng Zhang, Tongwen Chen
ENTCS
2007
107views more  ENTCS 2007»
13 years 4 months ago
Dynamic Contextual Adaptation
When developing systems based on COTS, components need to be adapted in most of the occasions to work under certain conditions which were not initially predicted by their develope...
Antonio Brogi, Javier Cámara, Carlos Canal,...
ALGORITHMICA
2007
145views more  ALGORITHMICA 2007»
13 years 4 months ago
Counting Integer Points in Parametric Polytopes Using Barvinok's Rational Functions
Abstract Many compiler optimization techniques depend on the ability to calculate the number of elements that satisfy certain conditions. If these conditions can be represented by ...
Sven Verdoolaege, Rachid Seghir, Kristof Beyls, Vi...
DEXA
1998
Springer
112views Database» more  DEXA 1998»
13 years 8 months ago
Optimisation of Active Rule Agents Using a Genetic Algorithm Approach
Intelligent agents and active databases have a number of common characteristics, the most important of which is that they both execute actions by firing rules upon events occurring...
Evaggelos Nonas, Alexandra Poulovassilis
IEEEARES
2010
IEEE
13 years 8 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
VMCAI
2004
Springer
13 years 9 months ago
Symbolic Implementation of the Best Transformer
This paper shows how to achieve, under certain conditions, abstract-interpretation ms that enjoy the best possible precision for a given abstraction. The key idea is a simple proce...
Thomas W. Reps, Shmuel Sagiv, Greta Yorsh