Sciweavers

4731 search results - page 193 / 947
» Securing Interactive Programs
Sort
View
CP
2005
Springer
15 years 10 months ago
Applying Constraint Programming to Rigid Body Protein Docking
In this paper we show how Constraint Programming (CP) techniques can improve the efficiency and applicability of grid-based algorithms for optimising surface contact between comple...
Ludwig Krippahl, Pedro Barahona
ICLP
1995
Springer
15 years 8 months ago
Operational Semantics of Constraint Logic Programs with Coroutining
The semantics of constraint logic programming languages with coroutining facilities (\freeze," suspension, residuation, etc.) cannot be fully declarative; thus, an operationa...
Andreas Podelski, Gert Smolka
157
Voted
ATAL
2010
Springer
15 years 6 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
OOPSLA
2005
Springer
15 years 10 months ago
Subtext: uncovering the simplicity of programming
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...
Jonathan Edwards
ICSE
2007
IEEE-ACM
16 years 5 months ago
The Social Dynamics of Pair Programming
This paper presents data from a four month ethnographic study of professional pair programmers from two software development teams. Contrary to the current conception of pair prog...
Jan Chong, Tom Hurlbutt