Sciweavers

1407 search results - page 239 / 282
» Using Use Cases in Executable Z
Sort
View
140
Voted
GECCO
2010
Springer
218views Optimization» more  GECCO 2010»
15 years 6 months ago
Cartesian genetic programming
This paper presents a new form of Genetic Programming called Cartesian Genetic Programming in which a program is represented as an indexed graph. The graph is encoded in the form o...
Julian Francis Miller, Simon L. Harding
ASWEC
2007
IEEE
15 years 6 months ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li
CCS
2007
ACM
15 years 6 months ago
A framework for diversifying windows native APIs to tolerate code injection attacks
We present a framework to prevent code injection attacks in MS Windows using Native APIs in the operating system. By adopting the idea of diversity, this approach is implemented i...
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis...
PODC
2010
ACM
15 years 6 months ago
Verifying linearizability with hindsight
We present a proof of safety and linearizability of a highlyconcurrent optimistic set algorithm. The key step in our proof is the Hindsight Lemma, which allows a thread to infer t...
Peter W. O'Hearn, Noam Rinetzky, Martin T. Vechev,...
ASPDAC
2004
ACM
96views Hardware» more  ASPDAC 2004»
15 years 6 months ago
Rate analysis for streaming applications with on-chip buffer constraints
While mapping a streaming (such as multimedia or network packet processing) application onto a specified architecture, an important issue is to determine the input stream rates tha...
Alexander Maxiaguine, Simon Künzli, Samarjit ...