Sciweavers

2076 search results - page 226 / 416
» Functional logic overloading
Sort
View
HOTDEP
2008
122views Hardware» more  HOTDEP 2008»
15 years 6 months ago
Dependable Self-Hosting Distributed Systems Using Constraints
We describe a technique for writing distributed applications which manage themselves over one or more utility computing infrastructures: by dynamically acquiring new computational...
Qin Yin, Justin Cappos, Andrew Baumann, Timothy Ro...
SE
2008
15 years 5 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
EUSFLAT
2001
183views Fuzzy Logic» more  EUSFLAT 2001»
15 years 5 months ago
On fuzzy rule-based algorithms for image segmentation using gray-level histogram analysis
One of the biggest problems in computer vision systems, analyzing images having high uncertainty/vagueness degree, is the treatment of such uncertainty. This problem is even clear...
Eduard Montseny, Pilar Sobrevilla
IJCAI
2001
15 years 5 months ago
Bidding Languages for Combinatorial Auctions
Combinatorial auctions provide a valuable mechanism for the allocation of goods in settings where buyer valuations exhibit complex structure with respect to substitutabilityand co...
Craig Boutilier, Holger H. Hoos
CADE
2010
Springer
15 years 5 months ago
Bugs, Moles and Skeletons: Symbolic Reasoning for Software Development
Abstract. Symbolic reasoning is in the core of many software development tools such as: bug-finders, test-case generators, and verifiers. Of renewed interest is the use of symbolic...
Leonardo Mendonça de Moura, Nikolaj Bj&osla...