Sciweavers

1466 search results - page 121 / 294
» Completeness of the Authentication Tests
Sort
View
PVLDB
2010
151views more  PVLDB 2010»
13 years 6 months ago
Data Auditor: Exploring Data Quality and Semantics using Pattern Tableaux
We present Data Auditor, a tool for exploring data quality and data semantics. Given a rule or an integrity constraint and a target relation, Data Auditor computes pattern tableau...
Lukasz Golab, Howard J. Karloff, Flip Korn, Divesh...
FECS
2010
161views Education» more  FECS 2010»
13 years 6 months ago
Distributed Laboratories: A Finite State Machine Module
: This paper presents an experimental module for teaching finite state machine concepts. This module is designed for use in a lecture-based course that does not currently have a la...
Bonnie Ferri, Jill Auerbach, Hongyi Qu
CHI
2005
ACM
14 years 8 months ago
Wizard of Oz interfaces for mixed reality applications
One important tool for developing complex interactive applications is "Wizard of Oz" (WOz) simulation. WOz simulation allows design concepts, content and partially compl...
Steven Dow, Jaemin Lee, Christopher Oezbek, Blair ...
CADE
2008
Springer
14 years 8 months ago
Automated Induction with Constrained Tree Automata
We propose a procedure for automated implicit inductive theorem proving for equational specifications made of rewrite rules with conditions and constraints. The constraints are int...
Adel Bouhoula, Florent Jacquemard
SIGIR
2004
ACM
14 years 1 months ago
Retrieval evaluation with incomplete information
This paper examines whether the Cranfield evaluation methodology is robust to gross violations of the completeness assumption (i.e., the assumption that all relevant documents wi...
Chris Buckley, Ellen M. Voorhees