Sciweavers

7103 search results - page 1000 / 1421
» Program Generation and Components
Sort
View
NDSS
2003
IEEE
15 years 10 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
153
Voted
CP
2003
Springer
15 years 10 months ago
Using the Breakout Algorithm to Identify Hard and Unsolvable Subproblems
Abstract. Local search algorithms have been very successful for solving constraint satisfaction problems (CSP). However, a major weakness has been that local search is unable to de...
Carlos Eisenberg, Boi Faltings
ILP
2003
Springer
15 years 10 months ago
ILP for Mathematical Discovery
We believe that AI programs written for discovery tasks will need to simultaneously employ a variety of reasoning techniques such as induction, abduction, deduction, calculation an...
Simon Colton, Stephen Muggleton
ISCA
2010
IEEE
232views Hardware» more  ISCA 2010»
15 years 10 months ago
Data marshaling for multi-core architectures
Previous research has shown that Staged Execution (SE), i.e., dividing a program into segments and executing each segment at the core that has the data and/or functionality to bes...
M. Aater Suleman, Onur Mutlu, José A. Joao,...
CSMR
2002
IEEE
15 years 9 months ago
Evolution Support by Homogeneously Documenting Patterns, Aspects and Traces
The evolution of complex software systems is promoted by software engineering principles and techniques like separation of concerns, encapsulation, stepwise refinement, and reusab...
Johannes Sametinger, Matthias Riebisch
« Prev « First page 1000 / 1421 Last » Next »