Sciweavers

1052 search results - page 92 / 211
» The Regular Real-Time Languages
Sort
View
157
Voted
ICS
2009
Tsinghua U.
15 years 10 months ago
High-performance regular expression scanning on the Cell/B.E. processor
Matching regular expressions (regexps) is a very common workload. For example, tokenization, which consists of recognizing words or keywords in a character stream, appears in ever...
Daniele Paolo Scarpazza, Gregory F. Russell
CP
2009
Springer
16 years 4 months ago
SOGgy Constraints: Soft Open Global Constraints
We investigate soft open constraints. We generalize and unify classes of soft constraints and adapt them to the open setting. We give sufficient conditions for generalized classes ...
Michael J. Maher
122
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 3 months ago
Maximum Entropy Rate of Markov Sources for Systems With Non-regular Constraints
Using the concept of discrete noiseless channels, it was shown by Shannon in A Mathematical Theory of Communication that the ultimate performance of an encoder for a constrained sy...
Georg Böcherer, Valdemar Cardoso da Rocha Jr....
154
Voted
ADAEUROPE
2005
Springer
15 years 9 months ago
Using the AADL to Describe Distributed Applications from Middleware to Software Components
Distributed Real-Time (DRE) systems require the verification of their properties to ensure both reliability and conformance to initial requirements. Architecture description langu...
Thomas Vergnaud, Laurent Pautet, Fabrice Kordon
120
Voted
DISCEX
2003
IEEE
15 years 9 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong