Sciweavers

597 search results - page 68 / 120
» Formal Techniques for Java-Like Programs
Sort
View
ISCAS
2006
IEEE
101views Hardware» more  ISCAS 2006»
14 years 1 months ago
Neuromimetic ICs and system for parameters extraction in biological neuron models
—This paper presents an analog neuromimetic integrated circuit and an associated system dedicated for experiments of parameters extraction in biological neuron models. The IC bas...
Sylvain Saïghi, Yannick Bornat, Jean Tomas, S...
DBPL
2007
Springer
100views Database» more  DBPL 2007»
14 years 1 months ago
Provenance as Dependency Analysis
Abstract. Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings; however, althou...
James Cheney, Amal Ahmed, Umut A. Acar
IFL
2005
Springer
103views Formal Methods» more  IFL 2005»
14 years 1 months ago
The Implementation of iData
The iData Toolkit is a toolkit that allows programmers to create interactive, type-safe, dynamic web applications with state on a high level of abstraction. The key element of this...
Rinus Plasmeijer, Peter Achten
ACL
2006
13 years 9 months ago
A Hybrid Relational Approach for WSD - First Results
We present a novel hybrid approach for Word Sense Disambiguation (WSD) which makes use of a relational formalism to represent instances and background knowledge. It is built using...
Lucia Specia
PPDP
2005
Springer
14 years 1 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...