Sciweavers

178 search results - page 20 / 36
» Dependability Arguments with Trusted Bases
Sort
View
FM
1999
Springer
126views Formal Methods» more  FM 1999»
13 years 11 months ago
Correctness Proof of the Standardized Algorithm for ABR Conformance
Conformance control for ATM cells is based on a real-time reactive algorithm which delivers a value depending on inputs from the network. This value must always agree with a well d...
Jean-François Monin, Francis Klay
ACL
2012
11 years 9 months ago
Sentence Compression with Semantic Role Constraints
For sentence compression, we propose new semantic constraints to directly capture the relations between a predicate and its arguments, whereas the existing approaches have focused...
Katsumasa Yoshikawa, Ryu Iida, Tsutomu Hirao, Mana...
NSPW
2004
ACM
14 years 26 days ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
EMNLP
2006
13 years 8 months ago
Unsupervised Discovery of a Statistical Verb Lexicon
This paper demonstrates how unsupervised techniques can be used to learn models of deep linguistic structure. Determining the semantic roles of a verb's dependents is an impo...
Trond Grenager, Christopher D. Manning
CCS
2006
ACM
13 years 11 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...