Sciweavers

2763 search results - page 53 / 553
» The Dangerous 'All' in Specifications
Sort
View
CP
2007
Springer
14 years 1 months ago
Exploring Different Constraint-Based Modelings for Program Verification
Recently, constraint-programming techniques have been used to generate test data and to verify the conformity of a program with its specification. Constraint generated for these ta...
Hélène Collavizza, Michel Rueher
JMLR
2010
118views more  JMLR 2010»
13 years 3 months ago
Learning to Rank for Personalized News Article Retrieval
This paper aims to tackle the very interesting and important problem of user personalized ranking of search results. The focus is on news retrieval and the data from which the ran...
Lorand Dali, Blaz Fortuna, Jan Rupnik
JAC
2008
13 years 10 months ago
Study of the NP-completeness of the compact table problem
The problem of compact tables is to maximise the overlap when building a word that is to include permutations of every given words (all the words being the same length). This probl...
Jean-Christophe Dubacq, Jean-Yves Moyen
ENTCS
2008
78views more  ENTCS 2008»
13 years 9 months ago
Silver: an Extensible Attribute Grammar System
Attribute grammar specification languages, like many domain specific languages, offer significant advantages to their users, such as high-level declarative constructs and domain-s...
Eric Van Wyk, Derek Bodin, Jimin Gao, Lijesh Krish...
COMPSEC
2000
112views more  COMPSEC 2000»
13 years 9 months ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...