Sciweavers

11539 search results - page 72 / 2308
» On Learning from Exercises
Sort
View
SAFECOMP
2005
Springer
15 years 3 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
PPSN
2004
Springer
15 years 3 months ago
Exploring the Evolutionary Details of a Feasible-Infeasible Two-Population GA
Abstract. A two-population Genetic Algorithm for constrained optimization is exercised and analyzed. One population consists of feasible candidate solutions evolving toward optimal...
Steven Orla Kimbrough, Ming Lu, David Harlan Wood
ITC
2003
IEEE
109views Hardware» more  ITC 2003»
15 years 3 months ago
The P1500 DFT Disclosure Document: A Standard to Communicate Mergeable Core DFT Data
While the IEEE P1500 standards working group is on the verge of recommending a standard test interface for "non-mergeable" cores, a need was felt to adopt a standard met...
Michael G. Wahl, Sudipta Bhawmik, Kamran Zarrineh,...
SIGADA
1998
Springer
15 years 2 months ago
Testing Generic Ada Packages with APE
Despite substantial research on methods and tools for testing reusable modules, little help is available for the tester in the eld. Commercial tools for system testing are widely ...
Daniel Hoffman, Jayakrishnan Nair, Paul A. Stroope...
CLEF
2006
Springer
15 years 1 months ago
Paraphrase Substitution for Recognizing Textual Entailment
We describe a method for recognizing textual entailment that uses the length of the longest common subsequence (LCS) between two texts as its decision criterion. Rather than requi...
Wauter Bosma, Chris Callison-Burch