Sciweavers

4386 search results - page 527 / 878
» A Tamper-Resistant Programming Language System
Sort
View
CP
2003
Springer
15 years 9 months ago
Constraint-Based Optimization with the Minimax Decision Criterion
Abstract. In many situations, a set of hard constraints encodes the feasible configurations of some system or product over which users have preferences. We consider the problem of...
Craig Boutilier, Relu Patrascu, Pascal Poupart, Da...
GECCO
2003
Springer
121views Optimization» more  GECCO 2003»
15 years 9 months ago
Evolving Hogg's Quantum Algorithm Using Linear-Tree GP
Intermediate measurements in quantum circuits compare to conditional branchings in programming languages. Due to this, quantum circuits have a natural linear-tree structure. In thi...
André Leier, Wolfgang Banzhaf
WCRE
1996
IEEE
15 years 8 months ago
Identifying Enumeration Types Modeled with Symbolic Constants
An important challenge in software reengineering is to encapsulate collections of related data that, due to the absence of appropriate constructs for encapsulation in legacy progr...
John M. Gravley, Arun Lakhotia
CORR
2011
Springer
173views Education» more  CORR 2011»
14 years 11 months ago
Linear Dependent Types and Relative Completeness
—A system of linear dependent types for the lambda calculus with full higher-order recursion, called d PCF, is introduced and proved sound and relatively complete. Completeness h...
Ugo Dal Lago, Marco Gaboardi
AAAI
1998
15 years 5 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...