Sciweavers

2539 search results - page 404 / 508
» Debugging Method Names
Sort
View
MICS
2008
108views more  MICS 2008»
14 years 10 months ago
Efficient Intensional Implementation for Lazy Functional Languages
The intensional transformation is a technique that can be used in order to eliminate higher-order functions from a functional program by introducing appropriate context manipulatio...
Angelos Charalambidis, Athanasios Grivas, Nikolaos...
ENTCS
2007
98views more  ENTCS 2007»
14 years 10 months ago
A Completeness Proof for Bisimulation in the pi-calculus Using Isabelle
We use the interactive theorem prover Isabelle to prove that the algebraic axiomatization of bisimulation equivalence in the pi-calculus is sound and complete. This is the first ...
Jesper Bengtson, Joachim Parrow
ENVSOFT
2007
88views more  ENVSOFT 2007»
14 years 10 months ago
Resampling-based software for estimating optimal sample size
The SISSI program implements a novel approach for the estimation of the optimal sample size in experimental data collection. It provides avisual evaluation system of sample size d...
Roberto Confalonieri, Marco Acutis, Gianni Bellocc...
AI
2005
Springer
14 years 10 months ago
Adopt: asynchronous distributed constraint optimization with quality guarantees
The Distributed Constraint Optimization Problem (DCOP) is able to model a wide variety of distributed reasoning tasks that arise in multiagent systems. Unfortunately, existing met...
Pragnesh Jay Modi, Wei-Min Shen, Milind Tambe, Mak...
TIFS
2008
179views more  TIFS 2008»
14 years 10 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...