Sciweavers

4218 search results - page 651 / 844
» Complete sets of cooperations
Sort
View
CAV
2008
Springer
113views Hardware» more  CAV 2008»
13 years 11 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg
CCS
2008
ACM
13 years 11 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
CICLING
2008
Springer
13 years 11 months ago
Dynamic Translation Memory: Using Statistical Machine Translation to Improve Translation Memory Fuzzy Matches
Abstract. Professional translators of technical documents often use Translation Memory (TM) systems in order to capitalize on the repetitions frequently observed in these documents...
Ergun Biçici, Marc Dymetman
BIRTHDAY
2005
Springer
13 years 11 months ago
A Mobility Calculus with Local and Dependent Types
Abstract. We introduce an ambient-based calculus that combines ambient mobility with process mobility, uses group names to collect ambients with homologous features, and exploits c...
Mario Coppo, Federico Cozzi, Mariangiola Dezani-Ci...
DAWAK
2006
Springer
13 years 11 months ago
COBRA: Closed Sequential Pattern Mining Using Bi-phase Reduction Approach
Sequential pattern mining aims to find frequent patterns (guarded by a minimum support) in a database of sequences. As the support decreases the number of sequential patterns will...
Kuo-Yu Huang, Chia-Hui Chang, Jiun-Hung Tung, Chen...