Sciweavers

6554 search results - page 1181 / 1311
» Constraint Logic Programming
Sort
View
132
Voted
MICS
2010
81views more  MICS 2010»
15 years 2 months ago
Tactics for Hierarchical Proof
Abstract. There is something of a discontinuity at the heart of popular tactical theorem provers. Low-level, fully-checked mechanical proofs are large trees consisting of primitive...
David Aspinall, Ewen Denney, Christoph Lüth
154
Voted
EUSFLAT
2009
196views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
Organizational Risk Assessment using Adaptive Neuro-Fuzzy Inference System
In this paper a fuzzy model based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is introduced for calculating the level of risk in managerial problems. In this model, affecting ...
Javad J. Jassbi, Sohrab Khanmohammadi
144
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
Semantics Centric Solutions for Application and Data Portability in Cloud Computing
Cloud computing has become one of the key considerations both in academia and industry. Cheap, seemingly unlimited computing resources that can be allocated almost instantaneously...
Ajith Ranabahu, Amit P. Sheth
172
Voted
ICFP
2001
ACM
16 years 3 months ago
Functioning without Closure: Type-Safe Customized Function Representations for Standard ML
The CIL compiler for core Standard ML compiles whole ML programs using a novel typed intermediate language that supports the generation of type-safe customized data representation...
Allyn Dimock, Ian Westmacott, Robert Muller, Frank...
136
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
« Prev « First page 1181 / 1311 Last » Next »