Sciweavers

466 search results - page 80 / 94
» Temporal Knowledge Acquisition and Modeling
Sort
View
CAV
2008
Springer
113views Hardware» more  CAV 2008»
13 years 9 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg
EDCC
2008
Springer
13 years 9 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
ATAL
2010
Springer
13 years 8 months ago
Reasoning about strategies of multi-agent programs
Verification of multi-agent programs is a key problem in agent research and development. This paper focuses on multi-agent programs that consist of a finite set of BDI-based agent...
Mehdi Dastani, Wojciech Jamroga
CLEIEJ
2007
152views more  CLEIEJ 2007»
13 years 7 months ago
Gene Expression Analysis using Markov Chains extracted from RNNs
Abstract. This paper present a new approach for the analysis of gene expression, by extracting a Markov Chain from trained Recurrent Neural Networks (RNNs). A lot of microarray dat...
Igor Lorenzato Almeida, Denise Regina Pechmann Sim...
PAMI
2006
243views more  PAMI 2006»
13 years 7 months ago
Dynamical Statistical Shape Priors for Level Set-Based Tracking
In recent years, researchers have proposed to introduce statistical shape knowledge into level set based segmentation methods in order to cope with insufficient low-level informati...
Daniel Cremers