Skip to main content
SQL injection is a type of attacks used to gain, manipulate, or delete information in any data-driven system whether this system is online or offline and whether this system is a web or non-web-based. It is distinguished by the... more
    • by 
    •   3  
      Static AnalysisRuntime AnalysisThree Tier Architecture
A strategy for adaptive control and energetic optimization of aerobic fermentors was implemented, with both air flow and agitation speed as manipulated variables. This strategy is separable in its components: control, optimization,... more
    • by 
    •   1261  
      Information SystemsElectrical EngineeringElectronic EngineeringCommunication Engineering
This experiment aims to find the strength of the negative correlation between the ratio of prime numbers in a shell sort’s gap sequence and the run-time of the sorting algorithm. Since there is no optimal gap-sequence for all cases, and... more
    • by 
    •   3  
      Computer ScienceSorting AlgorithmRuntime Analysis
We introduce StarFlow, a script-centric environment for data analysis. StarFlow has four main features: (1) extraction of control and data-flow dependencies through a novel combination of static analysis, dynamic runtime analysis, and... more
    • by 
    •   10  
      Static AnalysisData AnalysisProvenanceFlow Control
Motivation: To identify and characterize regions of functional interest in genomic sequence requires full, flexible query access to an integrated, up-to-date view of all related information, irrespective of where it is stored (within an... more
    • by 
    •   19  
      BioinformaticsRelational DatabaseComputational BiologyGene expression
We describe a data structure for three-dimensional Nef complexes, algorithms for boolean operations on them, and our implementation of data structure and algorithms. Nef polyhedra were introduced by W. Nef in his seminal 1978 book on... more
    • by 
    •   17  
      AlgorithmsComputational GeometryPure MathematicsOpen Source
We present an algorithm for finding the minimum cut of an undirected edge-weighted graph. It is simple in every respect. It has a short and compact description, is easy to implement, and has a surprisingly simple proof of correctness. Its... more
    • by 
    •   2  
      Minimum CutRuntime Analysis
We present an algorithm for finding the minimum cut of an undirected edge-weighted graph. It is simple in every respect. It has a short and compact description, is easy to implement, and has a surprisingly simple proof of correctness. Its... more
    • by 
    •   2  
      Minimum CutRuntime Analysis
Dynamically optimizing programs is worthwhile only if the overhead created by the dynamic optimizer is less than the benefit gained from the optimization. Program trace selection is one of the most important, yet time consuming,... more
    • by 
    •   2  
      Dynamic OptimizationRuntime Analysis
In this paper, we propose and present the design and initial development of the Fault awareness Enabled Computing Environment (FENCE) system for high end computing. FENCE is a comprehensive fault management system in the sense that it... more
    • by 
    •   3  
      High End ComputingRuntime AnalysisFault management
as representing the official policies, either expressed or implied, of any sponsoring institution, the U.S. government or any other entity.
    • by 
    •   4  
      Discrete MathematicsCompilerIntroductory CourseRuntime Analysis
A central question when parallelizing evolutionary algorithms is the choice of the number of parallel instances. In practice optimal parameter settings are often hard to find due to limited information about the optimization problem under... more
    • by 
    •   6  
      Population SizeParallel AlgorithmPopulation ModelUpper Bound
The majority of the work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it easier to experiment with mechanized formal methods such... more
    • by 
    •   16  
      Cognitive ScienceStatic AnalysisModel CheckingProgram Analysis
Many software engineering tasks can potentially be automated using search heuristics. However, much work is needed in designing and evaluating search heuristics before this approach can be routinely applied to a software engineering... more
    • by 
    •   8  
      Computer ScienceSoftware EngineeringEvolutionary algorithmsAutomated Software Engineering
Recently, the first rigorous runtime analyses of ACO algorithms appeared, covering variants of the MAX–MIN ant system and their runtime on pseudo-Boolean functions. Interestingly, a variant called 1-ANT is very sensitive to the... more
    • by 
    •   6  
      Swarm IntelligenceTheoryAnt Colony OptimizationMultidisciplinary
This paper reports on the first Workshop on Model-Driven Engineering for Design-Runtime Interaction in Complex Systems (also called MDE@DeRun 2018) that took place during the STAF 2018 week. It explains the main objectives, content and... more
    • by 
    •   9  
      Software EngineeringModel-Driven DevelopmentModel-Driven EngineeringModeling
A recent theoretical investigation of modular representations shows that certain modularizations can introduce a distance bias into a landscape. This was a static analysis, and empirical investigations were used to connect formal results... more
    • by 
    •   3  
      Static AnalysisSearch SpaceRuntime Analysis
Software testing is typically an ad hoc process where human testers manually write many test inputs and expected test results, perhaps automating their execution in a regression suite. This process is cumbersome and costly. This paper... more
    • by 
    •   7  
      Software TestingASMTest Case Generationautomated test case generation from UML diagrams
This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java programs. Runtime analysis is based on the idea of executing... more
    • by 
    •   9  
      Model CheckingDistributed SystemJava ProgrammingConcurrency
The performance of unstructured grid codes on workstations and distributed memory parallel computers is substantially a ected by the e ciency of the memory hierarchy. This e ciency essentially depends on the order of computation and... more
    • by 
    •   12  
      EngineeringSoftware EngineeringDistributed Shared Memory SystemAES
Abstract: As one of the emerging algorithms in the eld of Arti cial Immune Systems (AIS), the Dendritic Cell Algorithm (DCA) has been successfully applied to a number of challenging real-world problems. However, one criticism is the lack... more
    • by 
    •   3  
      Artificial Immune SystemsRuntime AnalysisDendritic Cell Algorithm
The fitness-level technique is a simple and old way to derive upper bounds for the expected runtime of simple elitist evolutionary algorithms (EAs). Recently, the technique has been adapted to deduce the runtime of algorithms with... more
    • by  and +2
    •   3  
      Evolutionary algorithmsGenetic AlgorithmsRuntime Analysis
A memetic algorithm (MA) is an Evolutionary Algorithm (EA) augmented with a local search. We previously defined a (1+1) Adaptive Memetic Algorithm (AMA) with two different local searches, and the comparison with the well-known (1+1) EA,... more
    • by 
    •   3  
      AlgorithmsAdaptive MutationsRuntime Analysis
The interplay between mutation and selection plays a fundamental role in the behavior of evolutionary algorithms (EAs). However, this interplay is still not completely understood. This paper presents a rigorous runtime analysis of a... more
    • by 
    •   16  
      Information SystemsGeneticsMathematicsComputer Science
The paper provides some theoretical results on the analysis of the expected time needed by a class of Ant Colony Optimization algorithms to solve combinatorial optimization problems. A part of the study refers to some general results on... more
    • by  and +1
    •   9  
      Applied MathematicsStatisticsCombinatorial OptimizationAnt Colony Optimization
    • by 
    •   2  
      Dynamic OptimizationRuntime Analysis
Addressing user's information needs has been one of the main goals of Web search engines since their early days. In some cases, users cannot see their needs immediately answered by search results, simply because these needs are too... more
    • by 
    •   6  
      Web searchSearch EngineWeb Search EngineInformation Need
ABSTRACT
    • by 
    •   6  
      GeneticsMigrationOptimization ProblemSpatial structure
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are infinite traces, finite traces appear naturally when testing... more
    • by 
    •   12  
      Cognitive ScienceComputer SoftwareRewritingVerification
The problem of testing whether a finite execution trace of events generated by an executing program violates a linear temporal logic (LTL) formula occurs naturally in runtime analysis of software. Two efficient algorithms for this problem... more
    • by 
    •   6  
      Temporal LogicsSafetyComputer SoftwareLinear Temporal Logic
Advances in the video gaming industry have led to the production of low-cost, high-performance graphics processing units (GPUs) that possess more memory bandwidth and computational capability than central processing units (CPUs), the... more
    • by 
    •   13  
      BioinformaticsHigh Performance ComputingComputer GraphicsComputational Biology
The interplay between mutation and selection plays a fundamental role in the behaviour of evolutionary algorithms (EAs). However, this interplay is still not completely understood. This paper presents a rigorous runtime analysis of a... more
    • by 
    •   15  
      Information SystemsGeneticsEvolutionary algorithmsComputational Complexity
We present a new parallel computation model called the Parallel Resource-Optimal computation model. PRO is a framework being proposed to enable the design of efficient and scalable parallel algorithms in an architecture-independent... more
    • by 
    •   6  
      Parallel AlgorithmsComputer ModelParallel AlgorithmParallel Computer
Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to attain. It requires time consuming simulations of the memory... more
    • by 
    •   7  
      Memory SystemsRandom access memoryOPTIMIZATION TECHNIQUELegacy software
Runtime analysis of evolutionary algorithms has become an important part in the theoretical analysis of randomized search heuristics. The first combinatorial problem where rigorous runtime results have been achieved is the well-known... more
    • by 
    •   7  
      Combinatorial ProblemsTheoretical AnalysisEvolutionary AlgorithmFitness Function
We extend the work of Lehre and Witt (GECCO 2010) on the unbiased black-box model by considering higher arity variation operators. * Timo Kötzing was supported by the Deutsche Forschungsgemeinschaft (DFG) under grant NE 1182/5-1. †... more
    • by 
    •   3  
      TheoryEvolutionary ComputingRuntime Analysis
Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to attain. It requires time consuming simulations of the memory... more
    • by 
    •   9  
      Memory SystemsRandom access memoryOPTIMIZATION TECHNIQUELegacy software
Computing has recently reached an inflection point with the introduction of multicore processors. On-chip thread-level parallelism is doubling approximately every other year. Concurrency lends itself naturally to allowing a program to... more
    • by 
    •   18  
      Distributed ComputingProgram AnalysisComputer SoftwarePerformance Prediction
We introduce StarFlow, a script-centric environment for data analysis. StarFlow has four main features: (1) extraction of control and data-flow dependencies through a novel combination of static analysis, dynamic runtime analysis, and... more
    • by 
    •   8  
      Static AnalysisData AnalysisFlow ControlAutomatic Parallelization
Abstract This paper describes the Alpaca runtime tools. These tools leverage the component infrastructure of the Cactus Framework in a novel way to enable runtime steering, monitoring, and interactive control of a simulation. Simulation... more
    • by 
    •   4  
      FrameworksProgram verificationUse CaseRuntime Analysis
The performance of unstructured grid codes on workstations and distributed memory parallel computers is substantially a ected by the e ciency of the memory hierarchy. This e ciency essentially depends on the order of computation and... more
    • by 
    •   12  
      EngineeringSoftware EngineeringDistributed Shared Memory SystemAES
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap growth, degrading performance and resulting in program crashes... more
    • by 
    •   3  
      Data StructureGarbage CollectionRuntime Analysis
    • by 
    •   6  
      Software TestingASMTest Case GenerationTemporal Logic
Robust regression techniques are used today in many computer vision algorithms. Chen and Meer recently presented a new robust regression technique named the projection based M-estimator. Unlike other methods in the RANSAC family of... more
    • by 
    •   8  
      Kernel SmoothingComputer Vision and Pattern RecognitionDensity EstimationFundamental Matrix
We consider the problem of automating the derivation of tight asymptotic complexity bounds for solving Horn clauses. Clearly, the solving time crucially depends on the "sparseness" of the computed relations. Therefore, our asymptotic... more
    • by 
    •   3  
      Program AnalysisComplexity AnalysisRuntime Analysis
In recent years, the advantage afforded by using multiple local searches in a Memetic Algorithm to solve one problem (a single fitness function), has been verified in many successful experiments. However, theoretical studies cannot... more
    • by 
    •   3  
      AlgorithmsCommerceRuntime Analysis
Many practical optimisation problems allow candidate solutions of varying lengths, and where the length of the optimal solution is thereby a priori unknown. We suggest that non-uniform mutation rates can be beneficial when solving such... more
    • by 
    •   6  
      Software EngineeringSoftware TestingInput OutputRuntime Analysis
Search algorithms have been used to tackle software engineering problems with promising results. Although the field has attracted a lot of attention recently, it still lacks a theoretical foundation. It has been empirically shown that... more
    • by 
    •   11  
      Software EngineeringSoftware TestingSearch Based Software EngineeringCombinatorial Problems
SQL injection is a type of attacks used to gain, manipulate, or delete information in any data-driven system whether this system is online or offline and whether this system is a web or non-web-based. It is distinguished by the... more
    • by 
    •   5  
      Computer ScienceStatic AnalysisDatabase Management SystemsRuntime Analysis
    • by 
    •   6  
      Program AnalysisComplexity AnalysisSparse MatrixAsymptotic Behavior