Sciweavers

369 search results - page 29 / 74
» Symbolic Semantics Revisited
Sort
View
ISM
2005
IEEE
151views Multimedia» more  ISM 2005»
14 years 1 months ago
Video Data Mining: Mining Semantic Patterns with temporal constraints from Movies
— For efficient video data management, ‘video data mining’ is required to discover ‘semantic patterns’ which are not only previously unknown and interesting, but also as...
Kimiaki Shirahama, Koichi Ideno, Kuniaki Uehara
PRL
2008
131views more  PRL 2008»
13 years 7 months ago
Progressive structural analysis for dynamic recognition of on-line handwritten mathematical expressions
Structural analysis in handwritten mathematical expressions focuses on interpreting the recognized symbols using geometrical information such as relative sizes and positions of th...
Ba-Quy Vuong, Siu Cheung Hui, Yulan He
GC
2004
Springer
14 years 1 months ago
Symbolic Equivalences for Open Systems
Abstract. Behavioural equivalences on open systems are usually defined by comparing system behaviour in all environments. Due to this “universal” quantification over the poss...
Paolo Baldan, Andrea Bracciali, Roberto Bruni
APN
2010
Springer
14 years 15 days ago
Factorization Properties of Symbolic Unfoldings of Colored Petri Nets
The unfolding technique is an efficient tool to explore the runs of a Petri net in a true concurrency semantics, i.e. without constructing all the interleavings of concurrent actio...
Thomas Chatain, Eric Fabre
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 11 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...