Sciweavers

250 search results - page 42 / 50
» Study of Feature Values for Subjective Classification of Mus...
Sort
View
80
Voted
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
15 years 3 months ago
Learned mutation strategies in genetic programming for evolution and adaptation of simulated snakebot
In this work we propose an approach of incorporating learned mutation strategies (LMS) in genetic programming (GP) employed for evolution and adaptation of locomotion gaits of sim...
Ivan Tanev
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
15 years 3 months ago
Quantifying trade-offs in resource allocation for VPNs
Virtual Private Networks (VPNs) feature notable characteristics in structure and traffic patterns that allow for efficient resource allocation. A strategy that exploits the underl...
Satish Raghunath, Shivkumar Kalyanaraman, K. K. Ra...
PPDP
2009
Springer
15 years 2 months ago
Context-based proofs of termination for typed delimited-control operators
We present direct proofs of termination of evaluation for typed delimited-control operators shift and reset using a variant of Tait’s method with context-based reducibility pred...
Malgorzata Biernacka, Dariusz Biernacki
SIGCSE
2008
ACM
150views Education» more  SIGCSE 2008»
14 years 9 months ago
Backstop: a tool for debugging runtime errors
The errors that Java programmers are likely to encounter can roughly be categorized into three groups: compile-time (semantic and syntactic), logical, and runtime (exceptions). Wh...
Christian Murphy, Eunhee Kim, Gail E. Kaiser, Adam...
RE
2008
Springer
14 years 9 months ago
Sensitivity analysis in the process of COTS mismatch-handling
Abstract During the selection of commercial off-theshelf (COTS) products, mismatches encountered between stakeholders' requirements and features offered by COTS products are i...
Abdallah Mohamed, Günther Ruhe, Armin Eberlei...