Theorem proving techniques are particularly well suited for reasoning about arithmetic above the bit level and for relating di erent f abstraction. In this paper we show how a non-...
John W. O'Leary, Miriam Leeser, Jason Hickey, Mark...
Abstract. Learning event models from videos has applications ranging from abnormal event detection to content based video retrieval. Relational learning techniques such as Inductiv...
Krishna S. R. Dubba, Anthony G. Cohn, David C. Hog...
The lack of automation associated with network operations in general and network configuration management in particular, is widely recognized as a significant contributing factor ...
Xu Chen, Zhuoqing Morley Mao, Jacobus E. van der M...
Safety-Critical Java (SCJ) is a dialect of Java that allows programmers to implement safety-critical systems, such as software to control airplanes, medical devices, and nuclear p...
Radio frequency identification (RFID) technology is believed to be the next revolutionary step in supply-chain management. Complex process simplification using RFID technology can ...
Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseo...