Sciweavers

506 search results - page 18 / 102
» Where Is the Value in a Program Verifier
Sort
View
103
Voted
ICFP
2008
ACM
16 years 12 days ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
103
Voted
SPAA
2004
ACM
15 years 5 months ago
The potential in energy efficiency of a speculative chip-multiprocessor
While lower supply voltage is effective for energy reduction, it suffers performance loss. To mitigate the loss, we propose to execute only the part, which does not have any influ...
Yuu Tanaka, Toshinori Sato, Takenori Koushiro
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
15 years 6 months ago
Learned mutation strategies in genetic programming for evolution and adaptation of simulated snakebot
In this work we propose an approach of incorporating learned mutation strategies (LMS) in genetic programming (GP) employed for evolution and adaptation of locomotion gaits of sim...
Ivan Tanev
117
Voted
ESOP
2005
Springer
15 years 6 months ago
Subtyping First-Class Polymorphic Components
We present a statically typed, class-based object oriented language where classes are first class polymorphic values. A main contribution of this work is the design of a type syst...
João Costa Seco, Luís Caires
101
Voted
DCC
2003
IEEE
16 years 22 hour ago
Linear Programming Optimization for Video Coding under Multiple Constraints
This paper introduces a linear programming (LP) technique that performs ratedistortion based optimization for constrained video coding. Given the assumption of piecewise linear an...
Yegnaswamy Sermadevi, Sheila S. Hemami