Sciweavers

2905 search results - page 287 / 581
» Formal Memetic Algorithms
Sort
View
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
15 years 5 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
CONSTRAINTS
2010
126views more  CONSTRAINTS 2010»
14 years 11 months ago
Lexicographically-ordered constraint satisfaction problems
Abstract. We describe a simple CSP formalism for handling multi-attribute preference problems with hard constraints, one that combines hard constraints and preferences so the two a...
Eugene C. Freuder, Robert Heffernan, Richard J. Wa...
JAR
2000
145views more  JAR 2000»
14 years 11 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
106
Voted
SAC
2010
ACM
14 years 9 months ago
A machine-checked soundness proof for an efficient verification condition generator
Verification conditions (VCs) are logical formulae whose validity implies the correctness of a program with respect to a specification. The technique of checking software properti...
Frédéric Vogels, Bart Jacobs 0002, F...
SIGMETRICS
1997
ACM
112views Hardware» more  SIGMETRICS 1997»
15 years 2 months ago
Group-Guaranteed Channel Capacity in Multimedia Storage Servers
One of the open questions in the design of multimedia storage servers is in what order to serve incoming requests. Given the capability provided by the disk layout and scheduling ...
Athanassios Tsiolis, Mary K. Vernon