Sciweavers

3318 search results - page 109 / 664
» The Weak Instance Model
Sort
View
FSTTCS
2006
Springer
13 years 11 months ago
On Decidability of LTL Model Checking for Process Rewrite Systems
We establish a decidability boundary of the model checking problem for infinite-state systems defined by Process Rewrite Systems (PRS) or weakly extended Process Rewrite Systems (w...
Laura Bozzelli, Mojmír Kretínsk&yacu...
ACE
2004
315views Education» more  ACE 2004»
13 years 9 months ago
Applying SPICE to e-Learning: An e-Learning Maturity Model?
The Capability Maturity Model and SPICE approach to software process improvement has resulted in a robust system for improving development process capability in the field of softw...
Stephen Marshall, Geoff Mitchell
ICONIP
2004
13 years 9 months ago
A Neural Network Model for Trace Conditioning
We studied the dynamics of a neural network which have both of recurrent excitatory and random inhibitory connections. Neurons started to become active when a relatively weak trans...
Tadashi Yamazaki, Shigeru Tanaka
NAACL
2010
13 years 6 months ago
Learning Dense Models of Query Similarity from User Click Logs
The goal of this work is to integrate query similarity metrics as features into a dense model that can be trained on large amounts of query log data, in order to rank query rewrit...
Fabio De Bona, Stefan Riezler, Keith Hall, Massimi...
ESORICS
2004
Springer
14 years 1 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld