Sciweavers

4731 search results - page 193 / 947
» Securing Interactive Programs
Sort
View
121
Voted
CP
2005
Springer
15 years 7 months ago
Applying Constraint Programming to Rigid Body Protein Docking
In this paper we show how Constraint Programming (CP) techniques can improve the efficiency and applicability of grid-based algorithms for optimising surface contact between comple...
Ludwig Krippahl, Pedro Barahona
119
Voted
ICLP
1995
Springer
15 years 5 months ago
Operational Semantics of Constraint Logic Programs with Coroutining
The semantics of constraint logic programming languages with coroutining facilities (\freeze," suspension, residuation, etc.) cannot be fully declarative; thus, an operationa...
Andreas Podelski, Gert Smolka
ATAL
2010
Springer
15 years 3 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
OOPSLA
2005
Springer
15 years 7 months ago
Subtext: uncovering the simplicity of programming
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...
Jonathan Edwards
95
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
The Social Dynamics of Pair Programming
This paper presents data from a four month ethnographic study of professional pair programmers from two software development teams. Contrary to the current conception of pair prog...
Jan Chong, Tom Hurlbutt