Sciweavers

757 search results - page 38 / 152
» How to decide
Sort
View
ISW
2004
Springer
14 years 1 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
CAV
2009
Springer
163views Hardware» more  CAV 2009»
14 years 8 months ago
Complete Instantiation for Quantified Formulas in Satisfiabiliby Modulo Theories
Quantifier reasoning in Satisfiability Modulo Theories (SMT) is a long-standing challenge. The practical method employed in modern SMT solvers is to instantiate quantified formulas...
Leonardo Mendonça de Moura, Yeting Ge
FASE
2009
Springer
14 years 2 months ago
Controller Synthesis from LSC Requirements
Live Sequence Charts (LSCs) is a visual requirements language for specifying reactive system behavior. When modeling and designing open reactive systems, it is often essential to h...
Hillel Kugler, Cory Plock, Amir Pnueli
IJCAI
2003
13 years 9 months ago
Evaluating Significance of Inconsistencies
Inconsistencies frequently occur in knowledge about the real-world. Some of these inconsistencies may be more significant than others, and some knowledgebases (sets of formulae) m...
Anthony Hunter
WSC
2008
13 years 10 months ago
Multi-resolution spatial simulation for molecular crowding
Spatial phenomena attract increasingly interest in computational biology. Molecular crowding, i.e. a dense population of macromolecules, is known to have a significant impact on t...
Matthias Jeschke, Adelinde M. Uhrmacher