Sciweavers

661 search results - page 55 / 133
» What Can We Expect from Program Verification
Sort
View
SCIA
2009
Springer
146views Image Analysis» more  SCIA 2009»
15 years 9 months ago
Extraction of Windows in Facade Using Kernel on Graph of Contours
In the past few years, street-level geoviewers has become a very popular web-application. In this paper, we focus on a first urban concept which has been identified as useful for...
Jean-Emmanuel Haugeard, Sylvie Philipp-Foliguet, F...
LREC
2010
152views Education» more  LREC 2010»
15 years 4 months ago
Predicting Persuasiveness in Political Discourses
In political speeches, the audience tends to react or resonate to signals of persuasive communication, including an expected theme, a name or an expression. Automatically predicti...
Carlo Strapparava, Marco Guerini, Oliviero Stock
FGCS
2006
101views more  FGCS 2006»
15 years 2 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...
SIGSOFT
2003
ACM
16 years 3 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...
CAV
2008
Springer
139views Hardware» more  CAV 2008»
15 years 4 months ago
CSIsat: Interpolation for LA+EUF
We present CSIsat, an interpolating decision procedure for the quantifier-free theory of rational linear arithmetic and equality with uninterpreted function symbols. Our implementa...
Dirk Beyer, Damien Zufferey, Rupak Majumdar