Sciweavers

6960 search results - page 1038 / 1392
» Continuity Analysis of Programs
Sort
View
127
Voted
WSC
1997
15 years 6 months ago
Applications of the Universal Joint Task List to Joint Exercise Results
The foundation of readiness is training. The Chairman, Joint Chiefs of Staff (CJCS) Joint Training Program institutes methods for identifying training requirements through review ...
Sam H. Parry, Michael C. McAneny, Richard J. Drome...
HPDC
2008
IEEE
15 years 4 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
SIAMJO
2008
93views more  SIAMJO 2008»
15 years 4 months ago
Multivariable Utility Functions
Abstract. Utility functions of several variables are ubiquitous in economics. Their maximization requires inversion of the gradient map. Using convex analysis tools, we provide a r...
Maria B. Chiarolla, Ulrich G. Haussmann
CCR
2004
151views more  CCR 2004»
15 years 4 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
RULEML
2010
Springer
15 years 3 months ago
Visualizing Logical Dependencies in SWRL Rule Bases
Rule bases are common in many business rule applications, clinical decision support programs, and other types of intelligent systems. As the size of the rule bases grows and the in...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das
« Prev « First page 1038 / 1392 Last » Next »