Sciweavers

2500 search results - page 379 / 500
» Specifying Behavior in C
Sort
View
MICRO
2002
IEEE
113views Hardware» more  MICRO 2002»
15 years 8 months ago
Vacuum packing: extracting hardware-detected program phases for post-link optimization
This paper presents Vacuum Packing, a new approach to profile-based program optimization. Instead of using traditional aggregate or summarized execution profile weights, this ap...
Ronald D. Barnes, Erik M. Nystrom, Matthew C. Mert...
154
Voted
GECCO
2010
Springer
129views Optimization» more  GECCO 2010»
15 years 8 months ago
A probabilistic functional crossover operator for genetic programming
The original mechanism by which evolutionary algorithms were to solve problems was to allow for the gradual discovery of sub-solutions to sub-problems, and the automated combinati...
Josh C. Bongard
ITS
2010
Springer
167views Multimedia» more  ITS 2010»
15 years 8 months ago
Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models
Identifying effective tutorial dialogue strategies is a key issue for intelligent tutoring systems research. Human-human tutoring offers a valuable model for identifying effective ...
Kristy Elizabeth Boyer, Robert Phillips, Amy Ingra...
SIGSOFT
2009
ACM
15 years 8 months ago
Qos-driven runtime adaptation of service oriented architectures
Runtime adaptation is recognized as a viable way for a serviceoriented system to meet QoS requirements in its volatile operating environment. In this paper we propose a methodolog...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
LADS
2009
Springer
15 years 8 months ago
Detecting Exceptions in Commitment Protocols: Discovering Hidden States
—Open multiagent systems consist of autonomous agents that are built by different vendors. In principle, open multiagent systems cannot provide any guarantees about the behaviors...
Özgür Kafali, Pinar Yolum