Sciweavers

2031 search results - page 199 / 407
» On Tree-Constrained Matchings and Generalizations
Sort
View
IANDC
2008
128views more  IANDC 2008»
14 years 10 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
ICGA
2008
208views Optimization» more  ICGA 2008»
14 years 10 months ago
Cross-Entropy for Monte-Carlo Tree Search
Recently, Monte-Carlo Tree Search (MCTS) has become a popular approach for intelligent play in games. Amongst others, it is successfully used in most state-of-the-art Go programs....
Guillaume Chaslot, Mark H. M. Winands, Istvan Szit...
IEE
2008
120views more  IEE 2008»
14 years 10 months ago
Reducing the use of nullable types through non-null by default and monotonic non-null
With Java 5 annotations, we note a marked increase in tools that can statically detect potential null dereferences. To be effective such tools require that developers annotate decl...
Patrice Chalin, Perry R. James, Frédé...
CORR
2006
Springer
93views Education» more  CORR 2006»
14 years 10 months ago
Functional dissipation microarrays for classification
In this article, we describe a new method of extracting information from signals, called functional dissipation, that proves to be very effective for enhancing classification of h...
D. Napoletani, Daniele C. Struppa, T. Sauer, V. Mo...
CORR
2007
Springer
134views Education» more  CORR 2007»
14 years 10 months ago
An Analytical Study of a Structured Overlay in the presence of Dynamic Membership
— In this paper, we present a complete analytical study of dynamic membership (aka churn) in structured peer-to-peer networks. We use a master-equation-based approach, which is u...
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurel...