Sciweavers

4722 search results - page 647 / 945
» Encoding Program Executions
Sort
View
105
Voted
FMCO
2007
Springer
103views Formal Methods» more  FMCO 2007»
15 years 10 months ago
Safety Guarantees from Explicit Resource Management
We present a language and a program analysis that certifies the safe use of flexible resource management idioms, in particular advance reservation or “block booking” of costl...
David Aspinall, Patrick Maier, Ian Stark
133
Voted
GECCO
2007
Springer
180views Optimization» more  GECCO 2007»
15 years 10 months ago
Towards the coevolution of cellular automata controllers for chemical computing with the B-Z reaction
We propose that the behaviour of non-linear media can be controlled automatically through coevolutionary systems. By extension, forms of unconventional computing, i.e., massively ...
Christopher Stone, Rita Toth, Andrew Adamatzky, Be...
110
Voted
ICCS
2007
Springer
15 years 10 months ago
Creating Individual Based Models of the Plankton Ecosystem
Abstract. The Virtual Ecology Workbench (VEW) is a suite of utilities for creating, executing and analysing biological models of the ocean. At its core is a mathematical language a...
Wes Hinsley, Tony Field, John Woods
204
Voted
IWCLS
2007
Springer
15 years 10 months ago
On Lookahead and Latent Learning in Simple LCS
Learning Classifier Systems use evolutionary algorithms to facilitate rule- discovery, where rule fitness is traditionally payoff based and assigned under a sharing scheme. Most c...
Larry Bull
RAID
2007
Springer
15 years 10 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...