Sciweavers

759 search results - page 52 / 152
» Identifying Modeling Errors in Signatures by Model Checking
Sort
View
TIFS
2008
179views more  TIFS 2008»
13 years 8 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
AIEDU
2006
77views more  AIEDU 2006»
13 years 9 months ago
Constraint-based Modeling and Ambiguity
Constraint-based modeling has been used in many application areas of Intelligent Tutoring Systems as a powerful means to analyse erroneous student solutions and generate helpful fe...
Wolfgang Menzel
FMICS
2006
Springer
14 years 19 days ago
SAT-Based Verification of LTL Formulas
Abstract. Bounded model checking (BMC) based on satisfiability testing (SAT) has been introduced as a complementary technique to BDDbased symbolic model checking of LTL properties ...
Wenhui Zhang
SIGSAND
2008
13 years 10 months ago
Advanced Reduction Rules for the Verification of EPC Business Process Models
: Conceptual business process models such as Event-driven Process Chains (EPCs) play an important role in the business process management life cycle. The problem in this context is...
Jan Mendling, Wil M. P. van der Aalst
ACL
2007
13 years 10 months ago
Randomised Language Modelling for Statistical Machine Translation
A Bloom filter (BF) is a randomised data structure for set membership queries. Its space requirements are significantly below lossless information-theoretic lower bounds but it ...
David Talbot, Miles Osborne