Sciweavers

146 search results - page 9 / 30
» Cyclic Leveling of Directed Graphs
Sort
View
114
Voted
ISSS
1997
IEEE
109views Hardware» more  ISSS 1997»
15 years 7 months ago
Reducing the Complexity of ILP Formulations for Synthesis
Integer Linear Programming ILP is commonly used in high level and system level synthesis. It is an NP-Complete problem in general cases. There exists some tools that give an o...
Anne Mignotte, Olivier Peyran
135
Voted
KDD
2008
ACM
246views Data Mining» more  KDD 2008»
16 years 4 months ago
Direct mining of discriminative and essential frequent patterns via model-based search tree
Frequent patterns provide solutions to datasets that do not have well-structured feature vectors. However, frequent pattern mining is non-trivial since the number of unique patter...
Wei Fan, Kun Zhang, Hong Cheng, Jing Gao, Xifeng Y...
204
Voted
FASE
2012
Springer
13 years 11 months ago
Integration Testing of Software Product Lines Using Compositional Symbolic Execution
Software product lines are families of products defined by feature commonality and variability, with a well-managed asset base. Recent work in testing of software product lines ha...
Jiangfan Shi, Myra B. Cohen, Matthew B. Dwyer
122
Voted
GG
2004
Springer
15 years 9 months ago
Representing First-Order Logic Using Graphs
We show how edge-labelled graphs can be used to represent first-order logic formulae. This gives rise to recursively nested structures, in which each level of nesting corresponds ...
Arend Rensink
150
Voted
CMS
2006
175views Communications» more  CMS 2006»
15 years 5 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin