Sciweavers

3025 search results - page 314 / 605
» Automatic Programming of Robots Using Genetic Programming
Sort
View
IFIP
2009
Springer
15 years 1 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
ESANN
2004
15 years 5 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk
GPC
2010
Springer
15 years 8 months ago
Actor Garbage Collection Using Vertex-Preserving Actor-to-Object Graph Transformations
Abstract. Large-scale distributed computing applications require concurrent programming models that support modular and compositional software development. The actor model supports...
Wei-Jen Wang, Carlos A. Varela, Fu-Hau Hsu, Cheng-...
SIGSOFT
2008
ACM
16 years 4 months ago
Using assertions to help end-user programmers create dependable web macros
Web macros give web browser users ways to "program" tedious tasks, allowing those tasks to be repeated more quickly and reliably than when performed by hand. Web macros ...
Andhy Koesnandar, Sebastian G. Elbaum, Gregg Rothe...
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
15 years 5 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...