Sciweavers

998 search results - page 60 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
NAACL
2010
13 years 6 months ago
Streaming First Story Detection with application to Twitter
With the recent rise in popularity and size of social media, there is a growing need for systems that can extract useful information from this amount of data. We address the probl...
Sasa Petrovic, Miles Osborne, Victor Lavrenko
RECONFIG
2008
IEEE
107views VLSI» more  RECONFIG 2008»
14 years 3 months ago
Fast Implementation of a Bio-inspired Model for Decentralized Gathering
In the context of the emergence of alternative computing resources to address the challenge of the upcoming end of Moore’s law, we consider the feasibility of gathering computat...
Bernard Girau, Cesar Torres-Huitzil
ICDCSW
2005
IEEE
14 years 2 months ago
Adding Context Information to Digital Photos
In a user centered design process, we investigate what context information may be used to augment digital photos with additional meta information. We describe our initial findings...
Paul Holleis, Matthias Kranz, Marion Gall, Albrech...
SPC
2005
Springer
14 years 2 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
HYBRID
2003
Springer
14 years 2 months ago
Automated Symbolic Reachability Analysis; with Application to Delta-Notch Signaling Automata
Abstract. This paper describes the implementation of predicate abstraction techniques to automatically compute symbolic backward reachable sets of high dimensional piecewise affine...
Ronojoy Ghosh, Ashish Tiwari, Claire Tomlin