Sciweavers

4281 search results - page 37 / 857
» How to Disembed a Program
Sort
View
CPAIOR
2009
Springer
15 years 7 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
105
Voted
FSE
2005
Springer
112views Cryptology» more  FSE 2005»
15 years 6 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda
105
Voted
UM
2001
Springer
15 years 5 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
ALP
1994
Springer
15 years 4 months ago
A Logic for Variable Aliasing in Logic Programs
This paper introduces a logic for a class of properties - in particular variable aliasing - used in static analysis of logic programs. The logic is shown to be sound, complete and ...
Elena Marchiori
118
Voted
EC
2006
118views ECommerce» more  EC 2006»
15 years 16 days ago
Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming
We show how Genetic Programming (GP) can be used to evolve useful quantum computing artefacts of increasing sophistication and usefulness: firstly specific quantum circuits, then ...
Paul Massey, John A. Clark, Susan Stepney