Sciweavers

5344 search results - page 166 / 1069
» Privacy-Preserving Set Operations
Sort
View
ISCAS
2003
IEEE
102views Hardware» more  ISCAS 2003»
15 years 8 months ago
Adaptivity figures of merit and K-rail diagrams - comprehensive performance characterization of low-noise amplifiers and voltage
Generally, analog RF front-end circuits are designed to be functional under the most stringent, fixed, operating conditions, where all the performance parameters are set by crude ...
Aleksandar Tasic, Wouter A. Serdijn, John R. Long
ICSE
2010
IEEE-ACM
15 years 8 months ago
Is operator-based mutant selection superior to random mutant selection?
Due to the expensiveness of compiling and executing a large number of mutants, it is usually necessary to select a subset of mutants to substitute the whole set of generated mutan...
Lu Zhang, Shan-Shan Hou, Jun-Jue Hu, Tao Xie, Hong...
99
Voted
LCPC
1993
Springer
15 years 7 months ago
Event-based Composition of Concurrent Programs
This paper presents a model for concurrent programming, where programs (concurrent program structures) are represented as composition expressions over component programs with suita...
Raju Pandey, James C. Browne
TAGT
1994
Springer
185views Graph Theory» more  TAGT 1994»
15 years 7 months ago
Concatenation of Graphs
An operation of concatenation is introduced for graphs. Then strings are viewed as expressions denoting graphs, and string languages are interpreted as graph languages. For a clas...
Joost Engelfriet, Jan Joris Vereijken
GPEM
2002
95views more  GPEM 2002»
15 years 3 months ago
On Appropriate Adaptation Levels for the Learning of Gene Linkage
A number of algorithms have been proposed aimed at tackling the problem of learning "Gene Linkage" within the context of genetic optimisation, that is to say, the problem...
James Smith