Sciweavers

181 search results - page 29 / 37
» Practical Artificial Intelligence Programming With Java
Sort
View
DRM
2005
Springer
15 years 3 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
94
Voted
PODS
2006
ACM
138views Database» more  PODS 2006»
15 years 9 months ago
Efficiently ordering subgoals with access constraints
d Abstract] Guizhen Yang Artificial Intelligence Center SRI International Menlo Park, CA 94025, USA Michael Kifer Dept. of Computer Science Stony Brook University Stony Brook, NY 1...
Guizhen Yang, Michael Kifer, Vinay K. Chaudhri
83
Voted
FLAIRS
2006
14 years 11 months ago
Computer-Aided Language Processing
The invited talk will introduce Computer-Aided Language Processing (CALP) as an emerging area of practical interest and significance and will present experiments of several CALP a...
Ruslan Mitkov
CP
2007
Springer
15 years 3 months ago
Limitations of Restricted Branching in Clause Learning
The techniques for making decisions, i.e., branching, play a central role in complete methods for solving structured CSP instances. In practice, there are cases when SAT solvers be...
Matti Järvisalo, Tommi A. Junttila
AI
2010
Springer
14 years 9 months ago
Soft arc consistency revisited
The Valued Constraint Satisfaction Problem (VCSP) is a generic optimization problem defined by a network of local cost functions defined over discrete variables. It has applicatio...
Martin C. Cooper, Simon de Givry, M. Sanchez, Thom...