Sciweavers

525 search results - page 30 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
122
Voted
CIKM
2010
Springer
15 years 24 days ago
Automatically suggesting topics for augmenting text documents
We present a method for automated topic suggestion. Given a plain-text input document, our algorithm produces a ranking of novel topics that could enrich the input document in a m...
Robert West, Doina Precup, Joelle Pineau
103
Voted
SAC
2010
ACM
15 years 9 months ago
Enhancing document structure analysis using visual analytics
During the last decade national archives, libraries, museums and companies started to make their records, books and files electronically available. In order to allow efficient ac...
Andreas Stoffel, David Spretke, Henrik Kinnemann, ...
MOVEP
2000
167views Hardware» more  MOVEP 2000»
15 years 5 months ago
Model Checking: A Tutorial Overview
We survey principles of model checking techniques for the automatic analysis of reactive systems. The use of model checking is exemplified by an analysis of the Needham-Schroeder p...
Stephan Merz
124
Voted
CCGRID
2007
IEEE
15 years 8 months ago
Reliability Analysis of Self-Healing Network using Discrete-Event Simulation
The number of processors embedded on high performance computing platforms is continuously increasing to accommodate user desire to solve larger and more complex problems. However,...
Thara Angskun, George Bosilca, Graham E. Fagg, Jel...
84
Voted
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 8 months ago
Filtering Spam Email Based on Retry Patterns
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
Peter Lieven, Björn Scheuermann, Michael Stin...