Sciweavers

2957 search results - page 420 / 592
» Code analysis and CS-XML
Sort
View
ICLP
2010
Springer
15 years 8 months ago
Implementation Alternatives for Bottom-Up Evaluation
Abstract. Bottom-up evaluation is a central part of query evaluation / program execution in deductive databases. It is used after a source code optimization like magic sets or SLDm...
Stefan Brass
WCNC
2010
IEEE
15 years 8 months ago
Distortion Exponents for Multi-Relay Cooperative Networks with Limited Feedback
— In this paper, we consider the transmission of a Gaussian source in a multi-relay cooperative network, where limited channel state feedback is combined with separate source and...
Jing Wang, Jie Liang, Sami Muhaidat
ACMSE
2004
ACM
15 years 8 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ACSD
2001
IEEE
134views Hardware» more  ACSD 2001»
15 years 8 months ago
Embedding Imperative Synchronous Languages in Interactive Theorem Provers
We present a new way to define the semantics of imperative synchronous languages by means of separating the control and the data flow. The control flow is defined by predicates th...
Klaus Schneider
HYBRID
2000
Springer
15 years 8 months ago
Computing Optimal Operation Schemes for Chemical Plants in Multi-batch Mode
We propose a computer-aided methodology to automatically generate time optimal production schemes for chemical batch plants operating in multi-batch mode. Our approach is based on ...
Peter Niebert, Sergio Yovine