Sciweavers

290 search results - page 23 / 58
» Using a Software Testing Technique to Improve Theorem Provin...
Sort
View
FASE
2009
Springer
14 years 5 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
SI3D
2003
ACM
14 years 3 months ago
Application of the two-sided depth test to CSG rendering
Shadow mapping is a technique for doing real-time shadowing. Recent work has shown that shadow mapping hardware can be used as a second depth test in addition to the z-test. In th...
Sudipto Guha, Shankar Krishnan, Kamesh Munagala, S...
COCO
2009
Springer
106views Algorithms» more  COCO 2009»
14 years 5 months ago
Improved Approximation of Linear Threshold Functions
We prove two main results on how arbitrary linear threshold functions f(x) = sign(w · x − θ) over the n-dimensional Boolean hypercube can be approximated by simple threshold f...
Ilias Diakonikolas, Rocco A. Servedio
LPAR
2012
Springer
12 years 6 months ago
The TPTP Typed First-Order Form with Arithmetic
Abstract. The TPTP World is a well established infrastructure supporting research, development, and deployment of Automated Theorem Proving systems. Recently, the TPTP World has be...
Geoff Sutcliffe, Stephan Schulz, Koen Claessen, Pe...
WSC
2008
14 years 26 days ago
Impact of qualification management on scheduling in semiconductor manufacturing
A qualification management software that proposes recipe qualifications on tools in toolsets for semiconductor manufacturing has been developed. The qualification proposals are ba...
Carl Johnzen, Philippe Vialletelle, Stéphan...