Sciweavers

2604 search results - page 509 / 521
» General constant expressions for system programming language...
Sort
View
104
Voted
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
EMSOFT
2008
Springer
15 years 1 months ago
Randomized directed testing (REDIRECT) for Simulink/Stateflow models
The Simulink/Stateflow (SL/SF) environment from Mathworks is becoming the de facto standard in industry for model based development of embedded control systems. Many commercial to...
Manoranjan Satpathy, Anand Yeolekar, S. Ramesh
113
Voted
GECCO
2008
Springer
182views Optimization» more  GECCO 2008»
15 years 22 days ago
Scaling ant colony optimization with hierarchical reinforcement learning partitioning
This paper merges hierarchical reinforcement learning (HRL) with ant colony optimization (ACO) to produce a HRL ACO algorithm capable of generating solutions for large domains. Th...
Erik J. Dries, Gilbert L. Peterson
100
Voted
BMCBI
2006
139views more  BMCBI 2006»
14 years 11 months ago
Integrated functional visualization of eukaryotic genomes
Background: Increasing amounts of data from large scale whole genome analysis efforts demands convenient tools for manipulation, visualization and investigation. Whole genome plot...
Rohit Ghai, Hannes Lindemann, Trinad Chakraborty
140
Voted
CORR
2004
Springer
177views Education» more  CORR 2004»
14 years 11 months ago
Typestate Checking and Regular Graph Constraints
We introduce regular graph constraints and explore their decidability properties. The motivation for regular graph constraints is 1) type checking of changing types of objects in ...
Viktor Kuncak, Martin C. Rinard