Sciweavers

2861 search results - page 116 / 573
» Constraint Programming
Sort
View
91
Voted
DATE
2010
IEEE
129views Hardware» more  DATE 2010»
15 years 7 months ago
A power optimization method for CMOS Op-Amps using sub-space based geometric programming
—— A new sub-space max-monomial modeling scheme for CMOS transistors in sub-micron technologies is proposed to improve the modeling accuracy. Major electrical parameters of CMOS...
Wei Gao, Richard Hornsey
143
Voted
SNPD
2003
15 years 3 months ago
Deductive and Inductive Methods for Program Synthesis
The paper discusses simple functional constraint networks and a value propagation method for program construction. Structural synthesis of programs is described as an example of d...
Jaan Penjam, Elena Sanko
112
Voted
SCAM
2008
IEEE
15 years 8 months ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
124
Voted
PPSN
1998
Springer
15 years 6 months ago
Parallel Evolutionary Optimisation with Constraint Propagation
Abstract. This paper describes a parallel model for a distributed memory architecture of a non traditional evolutionary computation method, which integrates constraint propagation ...
Alvaro Ruiz-Andino, Lourdes Araujo, José J....
110
Voted
AMAST
2004
Springer
15 years 7 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns