Sciweavers

1821 search results - page 270 / 365
» Security-Aware Program Transformations
Sort
View
ACMSE
2005
ACM
15 years 2 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones
112
Voted
AI
2007
Springer
15 years 28 days ago
From here to human-level AI
It is not surprising that reaching human-level AI has proved to be difficult and progress has been slow— though there has been important progress. The slowness and the demand t...
John McCarthy
115
Voted
JSC
2010
107views more  JSC 2010»
14 years 7 months ago
On the relation between Context and Sequence Unification
Both Sequence and Context Unification generalize the same problem: Word Unification. Besides that, Sequence Unification solves equations between unranked terms involving sequence ...
Temur Kutsia, Jordi Levy, Mateu Villaret
80
Voted
ICML
2005
IEEE
16 years 1 months ago
Action respecting embedding
Dimensionality reduction is the problem of finding a low-dimensional representation of highdimensional input data. This paper examines the case where additional information is kno...
Michael H. Bowling, Ali Ghodsi, Dana F. Wilkinson
89
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Beyond refactoring: a framework for modular maintenance of crosscutting design idioms
Despite the automated refactoring support provided by today's IDEs many program transformations that are easy to conceptualize-such as improving the implementation of a desig...
Macneil Shonle, William G. Griswold, Sorin Lerner