Sciweavers

206 search results - page 22 / 42
» Weak Alternating Automata Are Not That Weak
Sort
View
IJCAI
2007
13 years 9 months ago
An Analysis of the Use of Tags in a Blog Recommender System
The Web is experiencing an exponential growth in the use of weblogs or blogs, websites containing dated journal-style entries. Blog entries are generally organised using informall...
Conor Hayes, Paolo Avesani, Sriharsha Veeramachane...
CAV
2005
Springer
129views Hardware» more  CAV 2005»
14 years 1 months ago
Symbolic Systems, Explicit Properties: On Hybrid Approaches for LTL Symbolic Model Checking
In this work we study hybrid approaches to LTL symbolic model checking; that is, approaches that use explicit representations of the property automaton, whose state space is often ...
Roberto Sebastiani, Stefano Tonetta, Moshe Y. Vard...
FUIN
2006
85views more  FUIN 2006»
13 years 7 months ago
Towards Integrated Verification of Timed Transition Models
Abstract. This paper describes an attempt to combine theorem proving and model-checking to formally verify real-time systems in a discrete time setting. The Timed Automata Modeling...
Mark Lawford, Vera Pantelic, Hong Zhang
ICSR
2009
Springer
14 years 2 months ago
Introducing Motivations in Design Pattern Representation
Abstract. Design pattern formalization is aimed at encouraging the use of design patterns during the design phase. Many approaches focuses on providing solutions with a graphical n...
Luca Sabatucci, Massimo Cossentino, Angelo Susi
DATE
2007
IEEE
112views Hardware» more  DATE 2007»
14 years 1 months ago
Compact hardware design of Whirlpool hashing core
Weaknesses have recently been found in the widely used cryptographic hash functions SHA-1 and MD5. A potential alternative for these algorithms is the Whirlpool hash function, whi...
Timo Alho, Panu Hämäläinen, Marko H...