Sciweavers

2018 search results - page 192 / 404
» Code Normal Forms
Sort
View
126
Voted
CPAIOR
2007
Springer
15 years 9 months ago
On Boolean Functions Encodable as a Single Linear Pseudo-Boolean Constraint
A linear pseudo-Boolean constraint (LPB) is an expression of the form a1 · 1 + . . . + am · m ≥ d, where each i is a literal (it assumes the value 1 or 0 depending on whether a...
Jan-Georg Smaus
OTM
2005
Springer
15 years 8 months ago
A Service-Oriented Workflow Language for Robust Interacting Applications
Abstract. In a service-oriented world, a long-running business process can be implemented as a set of stateful services that represent the individual but coordinated steps that mak...
Surya Nepal, Alan Fekete, Paul Greenfield, Julian ...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 8 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
ICTAC
2004
Springer
15 years 8 months ago
Combining Algebraic and Model-Based Test Case Generation
Abstract. The classical work on test case generation and formal methods focuses either on algebraic or model-based specifications. In this paper we propose an approach to derive t...
Li Dan, Bernhard K. Aichernig
PAKDD
2004
ACM
127views Data Mining» more  PAKDD 2004»
15 years 8 months ago
Exploiting Recurring Usage Patterns to Enhance Filesystem and Memory Subsystem Performance
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...
Benjamin Rutt, Srinivasan Parthasarathy