Sciweavers

959 search results - page 74 / 192
» New Techniques for Algorithm Portfolio Design
Sort
View
CINQ
2004
Springer
119views Database» more  CINQ 2004»
15 years 5 months ago
How to Quickly Find a Witness
The subfield of itemset mining is essentially a collection of algorithms. Whenever a new type of constraint is discovered, a specialized algorithm is proposed to handle it. All o...
Daniel Kifer, Johannes Gehrke, Cristian Bucila, Wa...
DAC
1997
ACM
15 years 4 months ago
Safe BDD Minimization Using Don't Cares
In many computer-aided design tools, binary decision diagrams (BDDs) are used to represent Boolean functions. To increase the efficiency and capability of these tools, many algor...
Youpyo Hong, Peter A. Beerel, Jerry R. Burch, Kenn...
ICSE
1992
IEEE-ACM
15 years 3 months ago
Incremental Testing of Object-Oriented Class Structures
Although there is much interest in creating libraries of well-designed, thoroughly-tested classes that can be confidently reused for many applications, few class testing technique...
Mary Jean Harrold, John D. McGregor, Kevin J. Fitz...
STORAGESS
2005
ACM
15 years 5 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
DAC
1999
ACM
16 years 25 days ago
Engineering Change: Methodology and Applications to Behavioral and System Synthesis
Due to the unavoidable need for system debugging, performance tuning, and adaptation to new standards, the engineering change (EC) methodology has emerged as one of the crucial co...
Darko Kirovski, Miodrag Potkonjak