Sciweavers

660 search results - page 125 / 132
» Formalizing the Development of Agent-Based Systems Using Gra...
Sort
View
INLG
2010
Springer
13 years 6 months ago
Charting the Potential of Description Logic for the Generation of Referring Expressions
The generation of referring expressions (GRE), an important subtask of Natural Language Generation (NLG) is to generate phrases that uniquely identify domain entities. Until recen...
Yuan Ren, Kees van Deemter, Jeff Z. Pan
POPL
2003
ACM
14 years 9 months ago
Bitwidth aware global register allocation
Multimedia and network processing applications make extensive use of subword data. Since registers are capable of holding a full data word, when a subword variable is assigned a r...
Sriraman Tallam, Rajiv Gupta
BIRTHDAY
2003
Springer
14 years 1 months ago
Extreme Model Checking
One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checkin...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 24 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
BMCBI
2010
83views more  BMCBI 2010»
13 years 8 months ago
Trees on networks: resolving statistical patterns of phylogenetic similarities among interacting proteins
Background: Phylogenies capture the evolutionary ancestry linking extant species. Correlations and similarities among a set of species are mediated by and need to be understood in...
William P. Kelly, Michael P. H. Stumpf