Sciweavers

376 search results - page 28 / 76
» General Reversibility
Sort
View
80
Voted
IJCNN
2006
IEEE
15 years 8 months ago
Statistical Mechanics of Online Learning for Ensemble Teachers
— We analyze the generalization performance of a student in a model composed of linear perceptrons: a true teacher, ensemble teachers, and the student. Calculating the generaliza...
Seiji Miyoshi, Masato Okada
STOC
1987
ACM
104views Algorithms» more  STOC 1987»
15 years 5 months ago
The Boolean Formula Value Problem Is in ALOGTIME
The Boolean formula value problem is in alternating log time and, more generally, parenthesis context-free languages are in alternating log time. The evaluation of reverse Polish ...
Samuel R. Buss
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
15 years 7 months ago
Hybridizing evolutionary algorithms and clustering algorithms to find source-code clones
This paper presents a hybrid approach to detect source-code clones that combines evolutionary algorithms and clustering. A case-study is conducted on a small C++ code base. The pr...
Andrew Sutton, Huzefa H. Kagdi, Jonathan I. Maleti...
PODS
2008
ACM
155views Database» more  PODS 2008»
16 years 2 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
161
Voted
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 9 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson