Sciweavers

528 search results - page 51 / 106
» Construction of concrete verification models from C
Sort
View
DAM
2008
110views more  DAM 2008»
13 years 8 months ago
Counting and enumerating aggregate classifiers
We propose a generic model for the "weighted voting" aggregation step performed by several methods in supervised classification. Further, we construct an algorithm to en...
Jan Adem, Yves Crama, Willy Gochet, Frits C. R. Sp...
EMSOFT
2006
Springer
14 years 11 days ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
FSTTCS
2009
Springer
14 years 3 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
CADUI
2004
13 years 10 months ago
Dialogue-Based Design of Web Usability Questionnaires Using Ontologies
Abstract Questionnaires are nowadays widely used usability evaluation instruments, and several generic usability questionnaires are available. But these generic artifacts are not a...
Elena García Barriocanal, Miguel Áng...
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 10 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny