Sciweavers

62 search results - page 11 / 13
» Design and Evaluation of a Symbolic and Abstraction-Based Mo...
Sort
View
ICDAR
2003
IEEE
14 years 1 months ago
On Machine Understanding of Online Handwritten Mathematical Expressions
This paper aims at automatic recognition of online handwritten mathematical expressions written on an electronic tablet. The proposed technique involves two major stages: symbol r...
Utpal Garain, B. B. Chaudhuri
FAST
2008
13 years 10 months ago
Parity Lost and Parity Regained
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
ISSTA
2006
ACM
14 years 2 months ago
Test input generation for java containers using state matching
The popularity of object-oriented programming has led to the wide use of container libraries. It is important for the reliability of these containers that they are tested adequate...
Willem Visser, Corina S. Pasareanu, Radek Pel&aacu...
CCS
2004
ACM
14 years 1 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
HASE
2008
IEEE
14 years 2 months ago
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
Jonas Elmqvist, Simin Nadjm-Tehrani