Sciweavers

258 search results - page 48 / 52
» A High-Level Language for Modeling Algorithms and Their Prop...
Sort
View
TCS
2008
13 years 6 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
XSYM
2009
Springer
264views Database» more  XSYM 2009»
14 years 1 months ago
From Entity Relationship to XML Schema: A Graph-Theoretic Approach
Abstract. We propose a mapping from the Enhanced Entity Relationship conceptual model to the W3C XML Schema Language with the following properties: information and integrity constr...
Massimo Franceschet, Donatella Gubiani, Angelo Mon...
GECCO
2009
Springer
156views Optimization» more  GECCO 2009»
14 years 1 months ago
Characterizing the genetic programming environment for fifth (GPE5) on a high performance computing cluster
Solving complex, real-world problems with genetic programming (GP) can require extensive computing resources. However, the highly parallel nature of GP facilitates using a large n...
Kenneth Holladay
CIKM
2007
Springer
14 years 26 days ago
The role of documents vs. queries in extracting class attributes from text
Challenging the implicit reliance on document collections, this paper discusses the pros and cons of using query logs rather than document collections, as self-contained sources o...
Marius Pasca, Benjamin Van Durme, Nikesh Garera
CAV
2001
Springer
83views Hardware» more  CAV 2001»
13 years 11 months ago
Iterating Transducers
Regular languages have proved useful for the symbolic state exploration of infinite state systems. They can be used to represent infinite sets of system configurations; the tran...
Dennis Dams, Yassine Lakhnech, Martin Steffen