Sciweavers

5101 search results - page 773 / 1021
» Capturing Context Requirements
Sort
View
EUROCRYPT
2003
Springer
15 years 8 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
FM
2003
Springer
160views Formal Methods» more  FM 2003»
15 years 8 months ago
Translation-Based Compositional Reasoning for Software Systems
Software systems are often model checked by translating them into a directly model-checkable formalism. Any serious software system requires application of compositional reasoning ...
Fei Xie, James C. Browne, Robert P. Kurshan
156
Voted
FMCO
2003
Springer
188views Formal Methods» more  FMCO 2003»
15 years 8 months ago
Consistency Management Within Model-Based Object-Oriented Development of Components
Abstract. The Unified Modeling Language (UML) favors the construction of models composed of several submodels, modeling the system comunder development at different levels of abs...
Jochen Malte Küster, Gregor Engels
120
Voted
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
15 years 8 months ago
Studying the Advantages of a Messy Evolutionary Algorithm for Natural Language Tagging
The process of labeling each word in a sentence with one of its lexical categories (noun, verb, etc) is called tagging and is a key step in parsing and many other language processi...
Lourdes Araujo
113
Voted
GECCO
2003
Springer
15 years 8 months ago
Methods for Evolving Robust Programs
Many evolutionary computation search spaces require fitness assessment through the sampling of and generalization over a large set of possible cases as input. Such spaces seem par...
Liviu Panait, Sean Luke