Sciweavers

1634 search results - page 224 / 327
» Reasoning about Knowledge Using Rough Sets
Sort
View
SIGUCCS
2000
ACM
14 years 1 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
13 years 12 months ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner
SOSP
2001
ACM
14 years 7 months ago
Information and Control in Gray-Box Systems
In modern systems, developers are often unable to modify the underlying operating system. To build services in such an environment, we advocate the use of gray-box techniques. Whe...
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
FAC
2010
121views more  FAC 2010»
13 years 7 months ago
Blaming the client: on data refinement in the presence of pointers
Data refinement is a common approach to reasoning about programs, based on establishing that te program indeed satisfies all the required properties imposed by an intended abstract...
Ivana Filipovic, Peter W. O'Hearn, Noah Torp-Smith...
ACL
2003
13 years 11 months ago
Recognizing Expressions of Commonsense Psychology in English Text
Many applications of natural language processing technologies involve analyzing texts that concern the psychological states and processes of people, including their beliefs, goals...
Andrew Gordon, Abe Kazemzadeh, Anish Nair, Milena ...