Sciweavers

940 search results - page 107 / 188
» Rules and Strategies in Java
Sort
View
GECCO
2005
Springer
116views Optimization» more  GECCO 2005»
15 years 6 months ago
An empirical study on the handling of overlapping solutions in evolutionary multiobjective optimization
We focus on the handling of overlapping solutions in evolutionary multiobjective optimization (EMO) algorithms. First we show that there exist a large number of overlapping soluti...
Hisao Ishibuchi, Kaname Narukawa, Yusuke Nojima
164
Voted
POPL
2001
ACM
16 years 26 days ago
Oracle-based checking of untrusted software
We present a variant of Proof-Carrying Code (PCC) in which the trusted inference rules are represented as a higher-order logic program, the proof checker is replaced by a nondeter...
George C. Necula, Shree Prakash Rahul
89
Voted
KBSE
2007
IEEE
15 years 6 months ago
Inferring structural patterns for concern traceability in evolving software
As part of the evolution of software systems, effort is often invested to discover in what parts of the source code a feature (or other concern) is implemented. Unfortunately, kn...
Barthélémy Dagenais, Silvia Breu, Fr...
98
Voted
HICSS
2006
IEEE
139views Biometrics» more  HICSS 2006»
15 years 6 months ago
Tools for Building Intelligent Tutoring Systems
Intelligent Tutoring Systems (ITSs) have proved useful in a variety of domains, but are notoriously resource intensive to build. We have created two programs (“tutor generatorsâ...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
107
Voted
FCT
2005
Springer
15 years 6 months ago
Leftist Grammars and the Chomsky Hierarchy
Leftist grammars can be characterized in terms of rules of the form a → ba and cd → d, without distinction between terminals and nonterminals. They were introduced by Motwani e...
Tomasz Jurdzinski, Krzysztof Lorys