Abstract. This article presents an ego-centric approach for indexing and browsing meetings. The method considers two concepts: meetings’ data alignment with personal information ...
Abstract. In this paper we analyze the complexity of checking safety and termination properties, for a very simple, yet non-trivial, class of programs with singly-linked list data ...
Hash-consing is a technique to share values that are structurally equal. Beyond the obvious advantage of saving memory blocks, hash-consing may also be used to speed up fundamenta...
Abstract- Seeding the population of an evolutionary algorithm with solutions from previous runs has proved to be useful when learning control strategies for agents operating in a c...
Mitchell A. Potter, R. Paul Wiegand, H. Joseph Blu...
In this paper we partially describe JV2 M, a metaphorical simulation of the Java Virtual Machine where students can learn Java language compilation and reinforce object-oriented pr...