Sciweavers

2043 search results - page 362 / 409
» Reasoning About Security Models
Sort
View
FASE
2009
Springer
14 years 1 months ago
Interface Generation and Compositional Verification in JavaPathfinder
Abstract. We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface ...
Dimitra Giannakopoulou, Corina S. Pasareanu
ATAL
2006
Springer
14 years 1 months ago
Predicting people's bidding behavior in negotiation
This paper presents a statistical learning approach to predicting people's bidding behavior in negotiation. Our study consists of multiple 2-player negotiation scenarios wher...
Ya'akov Gal, Avi Pfeffer
CW
2004
IEEE
14 years 1 months ago
3D Freeform Design: Interactive Shape Deformations by the Use of CyberGlove
This paper presents an approach to realize a tool for interactive and intuitive deformation of 3D shapes. The approach combines a fast algorithm for 3D free form deformation that ...
Masatake Sato, Vladimir V. Savchenko, Ryutarou Ohb...
SDB
1995
95views Database» more  SDB 1995»
14 years 1 months ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
PARLE
1991
14 years 1 months ago
FORK: A High-Level Language for PRAMs
We present a new programming language designed to allow the convenient expression of algorithms for a parallel random access machine (PRAM). The language attempts to satisfy two p...
Torben Hagerup, Arno Schmitt, Helmut Seidl